Columnists: Archive: March 2015 

Phishing Attacks: Not Sophisticated, but Successful

While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.

Hadoop Security Still Evolving

While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.

Third-Party Vendors a Weak Link in Security Chain

Security shortcomings of third-party vendors are a cybercriminal's dream. So security pros should revisit how they manage vendor relationships.

Mobile Payment Fraud a Growing Problem: LexisNexis

Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.