Columnists 

5 Best Practices for Reducing Third-Party Security Risks

Vendors and other third-party partners have caused some big data breaches. Here is how to keep it from happening to you.

What Are Your Container Security Options?

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

Are There Open Source Vulnerability Assessment Options?

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

Open Source Software's Role in Breach Prevention and Detection

While proprietary vendors dominate the breach prevention and detection market, open source software plays a key role.

6 Cybersecurity Insights from SC Congress

Cyber insurance and new approaches to security patches were among topics on the agenda at the recent SC Congress.

5 Big Improvements in Wireshark

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

5 Key New Features in Nmap Network Security Tool

The open source network security tool's latest version offers significant improvements.

Procuring Security Tech a Hassle? These 9 Tips Will Help

Procuring enterprise security technology can be tricky. A government CISO offers nine tips that will help the procurement process go smoothly.

Is Jailbreaking Apple Devices Always a No-No?

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

TrueCrypt Travails Continue

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

Unlocking Smartphones: PINs, Patterns or Fingerprints?

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?

Apple Watch Security Risks (and Benefits)

With the Apple Watch, as with smartphones before it, security pros need to proactively prepare for the mobile device's entry into the workplace.

Apple vs. Android: Mobile Security Pros and Cons

Both Apple's iOS and Android have security strengths and weaknesses, experts say.

Can Sharing Threat Intelligence Prevent Cyberattacks?

The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.

Do APIs Pose a Security Risk?

APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security.

Hackers Make Financial Services Firms Top Target

Hackers target financial services firms 300 percent more than companies in other verticals, says Websense Security Labs.

Cyber War Is Hell

Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.

Why Is Fighting Cybercrime So Hard?

It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.

Are Your Databases Secure? Think Again

Targeting enterprise databases is a common attack tactic, as the Anthem breach showed, yet many companies neglect database security.

Catching Enterprise Mobility Management Wave

While mobile device management was once all the rage, enterprises are moving to enterprise mobility management as their mobile strategies become more essential to their business.

Windows Server 2003: No Support, No Security?

What are your options, if any, for mitigating security risks of continuing to run Windows Server 2003 after Microsoft ends extended support in July?

10 Trickiest Mobile Security Threats

Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile threats are the most problematic for security pros?

Do Threat Exchanges Work?

Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?

Phishing Attacks: Not Sophisticated, but Successful

While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.

Hadoop Security Still Evolving

While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.