dcsimg

Paul Rubens - Article Archives - Page 4

Is Shellshock a Feature, not a Bug?

November 5, 2014
The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.
READ MORE

Passwords Not Going Away Any Time Soon

October 20, 2014
While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.
READ MORE

Mobile Device Management Not Just for Big Companies

October 17, 2014
While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.
READ MORE

VeraCrypt a Worthy TrueCrypt Alternative

October 13, 2014
VeraCrypt, a popular open source encryption alternative to TrueCrypt, is at a crossroads as its primary contributor lacks the time to maintain it on his own.
READ MORE

TrueCrypt Getting a New Life

September 18, 2014
TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.
READ MORE

Startup Spotlight: Threat Detection Specialist ThetaRay

September 16, 2014
Israeli security startup ThetaRay promises to detect zero-day attacks, hidden APTs and other threats in seconds by simultaneously analyzing all security and operational data sources.
READ MORE

For Bank, Mobile Device Management Offers Benefits – Some Unexpected

September 8, 2014
Massachusetts' Needham Bank enjoys a bevy of benefits thanks to its mobile device management system.
READ MORE

Internet of Things a Potential Security Disaster

September 4, 2014
Experts believe the Internet of Things will be highly insecure, at least in the early days.
READ MORE

Mobile Device Management: The Buying Basics

August 22, 2014
Mobile device management (MDM) can help enterprises minimize security risks associated with BYOD. Here is what you need to know if you plan to purchase an MDM system.
READ MORE

Are TrueCrypt Users Screwed?

July 16, 2014
When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.
READ MORE

Hackers Using DDoS to Distract Infosec Staff

June 19, 2014
Hackers are increasingly using DDoS attacks as a kind of 'smokescreen' that helps them carry out data breaches.
READ MORE

Are Anti-Malware's Days Numbered?

May 30, 2014
Anti-malware software can't spot all malicious code. Is  isolating end-user tasks through virtualization a better approach to security?
READ MORE

How to Buy Static Analysis Tools

May 2, 2014
Static analysis tools can help software developers produce more secure applications. Here is what you need to know when evaluating such tools for your organization.
READ MORE

3 Tools for Enforcing Password Policies

March 27, 2014
User passwords are often a weak link in the corporate security chain. How can security pros make users adhere to strong password policies?
READ MORE

10 Bitcoin Security Tips

February 10, 2014
Bitcoins have the potential to revolutionize business payment transactions. But they also have some security shortcomings. Here are 10 tips for keeping Bitcoins secure.
READ MORE

6 Tips for Stronger Encryption

January 23, 2014
In the wake of revelations about NSA backdoors in encryption systems, organizations must do everything they can to ensure their encryption is as strong as possible.
READ MORE

7 Security Trends to Expect in 2014

December 18, 2013
From increasingly sophisticated DDoS attacks to stuxnets to insider threats, companies have plenty to worry about when it comes to enterprise security in 2014.
READ MORE

13 Hot Security Startups to Watch

November 13, 2013
There is always a batch of enterprise security startups with clever technologies poised to be purchased by Infosec giants. Here are 13 interesting security startups to keep an eye on.
READ MORE

White Hats for Hire Find Software Bugs

November 8, 2013
Companies that lack the resources to run their own bug bounty programs may want to consider a bug bounty as a service program.
READ MORE