Columnists 

How to Find the Right Penetration Testing Company

A penetration test is only as good as the company conducting it. Here is everything you need to know to find the right penetration testing company.

How Is EMV Transition Going?

U.S. retailers are in no hurry to transition to EMV, surveys find. What is holding them back?

How to Get Identity Authentication Right

Identity authentication is especially important for high-value transactions, so it is important to get it right.

6 Ways to Make IAM Work for Third-Party Organizations

Identity and access management (IAM) for third-party organizations is a tough security challenge. Gartner's Felix Gaehtgens offers tips that will help.

Evaluating a NGFW? Here Is All You Need to Know

Here is solid advice for evaluating a next-generation firewall (NGFW), from features to consider to questions to ask.

6 Tips for CISOs Selling Security to the Board

Some CISOs may dread presenting to the board of directors. These tips will help ensure it goes well.

3 Ways to Defeat 'Microsoft' and 'Dell' Phone Scams

Scam phone calls from 'Microsoft' and 'Dell' can trip up even security-conscious folks. How can you fight such phone scams?

What the Heck Is a CASB, and Do You Need One?

Cloud access security brokers are a relative newcomer to the enterprise, but cloud security concerns will drive rapid adoption of CASBs.

5 Best Practices for Reducing Third-Party Security Risks

Vendors and other third-party partners have caused some big data breaches. Here is how to keep it from happening to you.

What Are Your Container Security Options?

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

Are There Open Source Vulnerability Assessment Options?

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

Open Source Software's Role in Breach Prevention and Detection

While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.

6 Cybersecurity Insights from SC Congress

Cyber insurance and new approaches to security patches were among topics on the agenda at the recent SC Congress.

5 Big Improvements in Wireshark

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

5 Key New Features in Nmap Network Security Tool

The open source network security tool's latest version offers significant improvements.

Procuring Security Tech a Hassle? These 9 Tips Will Help

Procuring enterprise security technology can be tricky. A government CISO offers nine tips that will help the procurement process go smoothly.

Is Jailbreaking Apple Devices Always a No-No?

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

TrueCrypt Travails Continue

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

Unlocking Smartphones: PINs, Patterns or Fingerprints?

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?

Apple Watch Security Risks (and Benefits)

With the Apple Watch, as with smartphones before it, security pros need to proactively prepare for the mobile device's entry into the workplace.

Apple vs. Android: Mobile Security Pros and Cons

Both Apple's iOS and Android have security strengths and weaknesses, experts say.

Can Sharing Threat Intelligence Prevent Cyberattacks?

The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.

Do APIs Pose a Security Risk?

APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security.

Hackers Make Financial Services Firms Top Target

Hackers target financial services firms 300 percent more than companies in other verticals, says Websense Security Labs.

Cyber War Is Hell

Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.