Security Trends: Archive: June 2015 

Will Red Hat Enter the Security Market?

VIDEO: Red Hat CEO Jim Whitehurst discusses the role that security plays at the Linux vendor and whether it's a business he plans on entering with a new product.

Can Data Infrastructure Vendors Stop Hackers?

A group of prominent technology vendors are teaming to offer a highly secure data infrastructure built on Security-Enhanced Linux.

Startup Spotlight: Prelert's Anomaly Detection

Prelert first sold its anomaly detection technology to IT operations teams – but then customers begged them to create similar products for enterprise security.

Why Is Fighting Cybercrime So Hard?

It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.

Fighting Insider Attacks Is Tough: Survey

Only 21 percent of respondents continuously monitor user behavior to thwart insider attacks, finds a Crowd Research Partners survey.

Cloud Storage's Data Loss Prevention Problem

Nearly 18 percent of files in enterprise-approved apps violate DLP policies, finds a Netskope study. The worst offender: cloud storage apps.

Microsoft Wants to Fix Cloud Security's 'Trust Problem'

Microsoft Research could revolutionize cloud security with nascent solutions based on Intel technology.

Mobile Apps Live On, Wreak Security Havoc

While enterprise security teams fret about mobile malware, dead and stale apps on users' devices pose a far greater mobile security threat, finds an Appthority report.

Which Web Application Security Best Practice Really Matters?

Organizations want to build more secure Web applications, but they are having trouble identifying development best practices that really make a difference.