Access to applications, servers and network resources is the cornerstone of enterprise IT, which is all about enabling connectivity. Not every account should have full acces...
LAS VEGAS - Christine Gadsby, director of Product Security for BlackBerry, has a message for organizations developing software: It's easier to fix bugs in development than ...
Back in 1999, Eric Raymond coined the term "Linus' Law," which stipulates that given enough eyeballs, all bugs are shallow.
Linus' Law, named in honor of Linux creator L...
Container technology is being increasingly used by organizations as a way to deploy applications and micro-services. The promise of containers is improved agility and portab...
The open-source Kubernetes container orchestration is an increasingly deployed platform that is now supported across all three major public cloud providers (Google, AWS and Azure) as well as enterpr...
Bugs exist in software. That's a fact, not a controversial statement. The challenge (and controversy) lies in how different organizations find the bugs in their software.One...
Domain-based Message Authentication, Reporting and Conformance (DMARC) is an increasingly important approach for helping ensure the integrity of email coming from a given domain.
Un...
By default, email is not secure. That's not an inflammatory statement, just the inconvenient truth.When an email is sent or received, there is no obvious or clear indication...
Palo Alto, Calif.-based Simility, a fraud prevention technology startup, announced on Dec. 12 that it had raised $17.5 million in a Series B round of funding led by Accel. PayPal, The Valley Fund an...
CVE-2017-5638 is the code vulnerability that will long live in the corporate memory of Equifax, the credit ratings agency. A simple patch management system might ...