Columnists 

Can Sharing Threat Intelligence Prevent Cyberattacks?

The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.

Do APIs Pose a Security Risk?

APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security.

Hackers Make Financial Services Firms Top Target

Hackers target financial services firms 300 percent more than companies in other verticals, says Websense Security Labs.

Cyber War Is Hell

Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.

Why Is Fighting Cybercrime So Hard?

It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.

Are Your Databases Secure? Think Again

Targeting enterprise databases is a common attack tactic, as the Anthem breach showed, yet many companies neglect database security.

Catching Enterprise Mobility Management Wave

While mobile device management was once all the rage, enterprises are moving to enterprise mobility management as their mobile strategies become more essential to their business.

Windows Server 2003: No Support, No Security?

What are your options, if any, for mitigating security risks of continuing to run Windows Server 2003 after Microsoft ends extended support in July?

10 Trickiest Mobile Security Threats

Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile threats are the most problematic for security pros?

Do Threat Exchanges Work?

Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?

Phishing Attacks: Not Sophisticated, but Successful

While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.

Hadoop Security Still Evolving

While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.

Third-Party Vendors a Weak Link in Security Chain

Security shortcomings of third-party vendors are a cybercriminal's dream. So security pros should revisit how they manage vendor relationships.

Mobile Payment Fraud a Growing Problem: LexisNexis

Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.

6 Tips for Developing Secure IoT Apps

Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.

Email Is Not Forever: Advice on Archiving

In the wake of the Sony scandal, companies may wonder how long to retain email. Hint: The answer is not "forever."

EMV Is No Payment Security Panacea

Implement EMV and you eliminate payment card fraud, right? Wrong.

10 Tips for Secure Business Travel

Business travelers are an attractive target for hackers. Here's how to protect yourself when you are on the road.

The Trouble with Tor

Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.

Dealing with a Data Breach: Tips from the Trenches

Thorough documentation and clear communication can make dealing with a data breach a little less painful.

IAM Best Practices: Involve HR, Use Single Sign-on

While identity and access management is a challenge for all organizations, especially global ones, panelists at the SC Congress event offered tips that can help.

Apple Pay: How Secure Is It?

Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.

Is Shellshock a Feature, not a Bug?

The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.

Passwords Not Going Away Any Time Soon

While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.

No Easy Fix for Point-of-Sale Security

Why is securing point-of-sale systems so hard, and what can retailers do to improve their PoS security postures?