Security Trends 

SIEM Guide: A Comprehensive View of Security Information and Event Management Tools

Security Information and Event Management (SIEM) tools monitor logs from network hardware and software to spot security threats, detect and prevent breaches, and provide forensic analysis. Learn everything you need to know to implement a SIEM system.

Penetration Testing: DIY or Hire a Pen Tester?

The best approach may be to do both: Hire a pen tester to get started, and learn to do it yourself for ongoing penetration testing. We give you everything you need to know about DIY and third-party pen testing.

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

Identity and Access Management: Balancing Access and Security

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

Cyber Insurance: Insuring Your Data When Protecting It Fails

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

Cybersecurity Risk Management: Finding and Fixing Your Security Vulnerabilities

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

Application Firewalls: Protecting Web Applications from Attacks

Application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

Where Do Venture Capitalists See Security Opportunities?

VCs from Trident Capital Cybersecurity, Elephant, Glasswing Ventures and Ten Eleven Ventures discuss where they see the opportunity to profit.

RSA 2017: IT Security Teams Face an Uphill Battle

Today's businesses are journeying into treacherous territory with too few security professionals behind the wheel.

RSA Conference Security Panel Isn't Worried about GDPR

Lawyers from Google, Cisco and Microsoft talk about privacy and why they're confident they're all moving in the right direction.

4 Ways to Upgrade Your Threat Sharing

Top InfoSec brass spoke at the 2016 Advanced Cyber Security Center conference on the importance of collaborative threat sharing.

Vulnerable Voting Machines Yet Another IoT Device to Secure

The growth of internet-connected devices, including voting machines, means security pros must pay more attention to software vulnerability management.

Hacking the Presidential Election: Can It Happen?

Hackers can leverage lots of technical vulnerabilities to affect election results. But a coordinated attack would be tough, due to voting systems' fragmented nature.

Startup Spotlight: Sift Science's Fraud Prevention Platform

Startup Sift Science wants to take fraud prevention to the next level with its platform powered by machine learning.

Point-of-Sale Security Still a Big Problem

Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.

Can Feds Compromise on Data Privacy?

As hawkish U.S. legislators seek to weaken encryption, a bill up for consideration welcomes private-sector interests to the table for a "dialogue." But is it a trap?

Startup Spotlight: Cymmetria's Cyber Deception Technology

Cymmetria's cyber deception technology turns the tables on bad guys by luring them to decoys where users can track their lateral movements.

3 Cases of InfoSec Hubris That Led to Big Breaches

Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.

How Symantec's New COO Measures Security Success

Mike Fey, president and COO of Symantec, talks about how he will bring the former Blue Coat and Symantec teams together. [VIDEO]

IBM X-Force Red Takes Pen Testing to Next Level

Penetration testing should be about more than hitting a compliance goal.

Linux Foundation Restructuring CII Security Effort for Scale

The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]



How DevSecOps Will Change Security

DevSecOps will become a common thread in every enterprise security approach, opines Mike Kail, co-founder and chief innovation officer of Cybric.

Should Enterprise Security Software Be under Warranty?

Should enterprise security software offer warranties, much as consumer products and services do?

Using a Neural Network to Improve Social Spear Phishing

Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.

DARPA's Machine Challenge Solves CrackAddr Puzzle

Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]