Security Trends 

Startup Spotlight: BitSight Technologies' Risk Management

BitSight Technologies helps companies manage risks associated with third-party suppliers with a ratings service modeled on those offered by credit bureaus.

How LinkedIn Scales Security [VIDEO]

Cory Scott, director of Information Security at LinkedIn, discusses how the business social network manages security even with a small team.

Why Microsoft Wants to Improve Open Source Security [VIDEO]

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

Will HITRUST Cert Improve Health Care Cybersecurity?

The Health Information Trust Alliance believes certification based on its Common Security Framework will make health care organizations more secure.

Using Passive DNS to Fight Cybercrime

Going after bad guys can lead to unintended Internet collateral damage, but Paul Vixie has some ideas on limiting the risk with DNS.

HP on Legal Hacking and the Law

HP's Zero Day Initiative buys a lot of security vulnerabilities from researchers – so how does it stay within the bounds of the law?

RFID Susceptible to Cloning, Other Hacks

As RFID usage grows, so too do tools to clone and abuse RFID signals.

Don't Ignore Dark Web Dangers

Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.

Black Hat Car Hackers Did It as a Hobby [VIDEO]

Hacking a Jeep wasn't part of their day jobs, explain Charlie Miller and Chris Valasek.

Man in the Cloud Attack Leverages SaaS Vulnerability

Attackers could use SaaS service synchronization to steal your enterprise data.

Can New Intel Tech Revolutionize Application Security? [VIDEO]

Steve Grobman, Intel Fellow and CTO of Intel Security, discusses upcoming innovation in silicon that could have a huge impact on software security.

Startup Spotlight: BrightPoint Security's Threat Intelligence Management

BrightPoint Security enables organizations to share threat intelligence with peers – a tactic that has worked well for cybercriminals, points out the company's CEO.

How Stan Black Secures Citrix and Its Customers [VIDEO]

Citrix Chief Security Officer Stan Black discusses how he keeps Citrix and its customers safe, a tough job at a company that sees 22,261 security events per minute on a typical day.



Wi-Fi Security Needs Work, Says IEEE Group

An IEEE study group hopes its research will improve Wi-Fi security.

Hackers Make Financial Services Firms Top Target

Hackers target financial services firms 300 percent more than companies in other verticals, says Websense Security Labs.

Cloud More Secure than OnPrem, Says Amazon CTO

Moving to the cloud is the best way an organization can improve security and compliance, insists Amazon CTO Werner Vogels.

Cyber War Is Hell

Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.

Will Red Hat Enter the Security Market?

VIDEO: Red Hat CEO Jim Whitehurst discusses the role that security plays at the Linux vendor and whether it's a business he plans on entering with a new product.

Can Data Infrastructure Vendors Stop Hackers?

A group of prominent technology vendors are teaming to offer a highly secure data infrastructure built on Security-Enhanced Linux.

Startup Spotlight: Prelert's Anomaly Detection

Prelert first sold its anomaly detection technology to IT operations teams – but then customers begged them to create similar products for enterprise security.

Why Is Fighting Cybercrime So Hard?

It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.

Fighting Insider Attacks Is Tough: Survey

Only 21 percent of respondents continuously monitor user behavior to thwart insider attacks, finds a Crowd Research Partners survey.

Cloud Storage's Data Loss Prevention Problem

Nearly 18 percent of files in enterprise-approved apps violate DLP policies, finds a Netskope study. The worst offender: cloud storage apps.

Microsoft Wants to Fix Cloud Security's 'Trust Problem'

Microsoft Research could revolutionize cloud security with nascent solutions based on Intel technology.

Mobile Apps Live On, Wreak Security Havoc

While enterprise security teams fret about mobile malware, dead and stale apps on users' devices pose a far greater mobile security threat, finds an Appthority report.