Columnists 

Hacking the Presidential Election: Can It Happen?

Hackers can leverage lots of technical vulnerabilities to affect election results. But a coordinated attack would be tough, due to voting systems' fragmented nature.

Point-of-Sale Security Still a Big Problem

Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.

Mac Malware Part of Worsening Security Picture

While Mac malware is not as big of a problem as attacks meant for Windows, hackers are targeting Apple operating systems more than ever before.

7 Database Security Best Practices

Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data.

5 Freaky but Real Application Security Threats

There are some new application security threats in town, and they are pretty scary.

Patch Management Software Buyer's Guide

Patch management software automates patch management, one of the most important security tasks in any organization.

How to Encrypt a Flash Drive Using VeraCrypt

Many security experts prefer open source software like VeraCrypt, which can be used to encrypt flash drives, because of its readily available source code.

What Is SQL Injection and How Can It Hurt You?

Using SQL injection hackers can wreak havoc on databases and data-driven applications. Fortunately there are ways to reduce SQL injection risk.

5 Ways to Defuse Data Threat from Departing Employees

Departing employees who take sensitive data with them present a huge security threat. Protection begins with data discovery and classification.

7 Full Disk Encryption Solutions to Check out

Full disk encryption software offers valuable protection for data on laptops. These seven FDE solutions are worthy of consideration.

IoT Security Begins with Risk Assessment

Weigh benefits of IoT devices against potential security risks to determine on a device-by-device basis if the technology should be used, experts advise.

How to Find the Right Penetration Testing Company

A penetration test is only as good as the company conducting it. Here is everything you need to know to find the right penetration testing company.