dcsimg

Security Trends: Archive: April 2015 

Startup Spotlight: Prevoty's Application Security

Despite the growing importance of applications, the application layer is a "black hole" of enterprise security, says company's co-founder.

Google, Facebook and Microsoft on Data Privacy

Data privacy should be integrated at the beginning of product development process, tech titans agree.

IoT 'Security Hopscotch' Is No Game: Chris Roberts

Chris Roberts, in hot water after tweeting about a hack into a plane's WiFi system, describes another theoretical attack, this one against an Internet-connected appliance.

What Bruce Schneier Learned from the Sony Breach

Bruce Schneier provides guidance for organizations in the post-Sony breach world.

Cryptographer Panel Slams Government Key Escrow Idea

Experts on a cryptography panel at the RSA conference reject the idea of the U.S. government holding encryption keys.

Little Change in Security Workforce Challenges, Study Finds

Another big IT security firm finds a shortage of skilled infosec pros, again.

Manual Penetration Testing Still Crucial to Smart App Development

With automated security testing, you do not need manual penetration testing when developing apps, right? Wrong!

Mach37 Accelerates Security Startups

'Cyber accelerator' offers $50,000 and lots of training to security startups.

Do Threat Exchanges Work?

Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?