Security Trends: Archive: August 2015 

How LinkedIn Scales Security [VIDEO]

Cory Scott, director of Information Security at LinkedIn, discusses how the business social network manages security even with a small team.

Why Microsoft Wants to Improve Open Source Security [VIDEO]

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

Will HITRUST Cert Improve Health Care Cybersecurity?

The Health Information Trust Alliance believes certification based on its Common Security Framework will make health care organizations more secure.

Using Passive DNS to Fight Cybercrime

Going after bad guys can lead to unintended Internet collateral damage, but Paul Vixie has some ideas on limiting the risk with DNS.

HP on Legal Hacking and the Law

HP's Zero Day Initiative buys a lot of security vulnerabilities from researchers – so how does it stay within the bounds of the law?

RFID Susceptible to Cloning, Other Hacks

As RFID usage grows, so too do tools to clone and abuse RFID signals.

Don't Ignore Dark Web Dangers

Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.

Black Hat Car Hackers Did It as a Hobby [VIDEO]

Hacking a Jeep wasn't part of their day jobs, explain Charlie Miller and Chris Valasek.

Man in the Cloud Attack Leverages SaaS Vulnerability

Attackers could use SaaS service synchronization to steal your enterprise data.

Can New Intel Tech Revolutionize Application Security? [VIDEO]

Steve Grobman, Intel Fellow and CTO of Intel Security, discusses upcoming innovation in silicon that could have a huge impact on software security.