Columnists 

Mobile Payment Fraud a Growing Problem: LexisNexis

Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.

6 Tips for Developing Secure IoT Apps

Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.

Email Is Not Forever: Advice on Archiving

In the wake of the Sony scandal, companies may wonder how long to retain email. Hint: The answer is not "forever."

EMV Is No Payment Security Panacea

Implement EMV and you eliminate payment card fraud, right? Wrong.

10 Tips for Secure Business Travel

Business travelers are an attractive target for hackers. Here's how to protect yourself when you are on the road.

The Trouble with Tor

Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.

Dealing with a Data Breach: Tips from the Trenches

Thorough documentation and clear communication can make dealing with a data breach a little less painful.

IAM Best Practices: Involve HR, Use Single Sign-on

While identity and access management is a challenge for all organizations, especially global ones, panelists at the SC Congress event offered tips that can help.

Apple Pay: How Secure Is It?

Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.

Is Shellshock a Feature, not a Bug?

The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.

Passwords Not Going Away Any Time Soon

While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.

No Easy Fix for Point-of-Sale Security

Why is securing point-of-sale systems so hard, and what can retailers do to improve their PoS security postures?

VeraCrypt a Worthy TrueCrypt Alternative

A fork of TrueCrypt's code, VeraCrypt strengthens the open source encryption software's transformation process and addresses other weaknesses.

TrueCrypt Getting a New Life

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.

Startup Spotlight: Threat Detection Specialist ThetaRay

Israeli security startup ThetaRay promises to detect zero-day attacks, hidden APTs and other threats in seconds by simultaneously analyzing all security and operational data sources.

For Bank, Mobile Device Management Offers Benefits – Some Unexpected

Massachusetts' Needham Bank enjoys a bevy of benefits thanks to its mobile device management system.

Internet of Things a Potential Security Disaster

Experts believe the Internet of Things will be highly insecure, at least in the early days.

Mobile Device Management: The Buying Basics

Mobile device management (MDM) can help enterprises minimize security risks associated with BYOD. Here is what you need to know if you plan to purchase an MDM system.

Big Data Overwhelms Security Teams

Experts say increased automation and better analytics will help security teams overwhelmed by Big Data.

How to Minimize Enterprise File Sharing Risks

File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.

Are TrueCrypt Users Screwed?

When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.

Hackers Using DDoS to Distract Infosec Staff

Hackers are increasingly using DDoS attacks as a kind of 'smokescreen' that helps them carry out data breaches.

Data Breach Roundup: May 2014

Third-party vendors played a significant part in a handful of data breaches in May. This is why, experts say, companies must ensure vendors are careful with their data.

Are Anti-Malware's Days Numbered?

Anti-malware software can't spot all malicious code. Is  isolating end-user tasks through virtualization a better approach to security?

Managed Security Services' Role in Cloud Security

A managed security service provider (MSSP) is a good option for cloud security, say experts.