×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Sean Michael Kerner - Article Archives - Page 2

Cloud Security Alliance Takes Aim at Next Generation Cloud

February 29, 2016
Cloud Security Alliance announces a new global advisory board and starts guidance for security-as-a-service and NFV offerings.
READ MORE

IBM Buys Resilient Systems for Incident Response

February 29, 2016
Famous security expert Bruce Schneier will join IBM as part of Big Blue's acquisition of incident response specialist Resilient Systems.
READ MORE

Devices Running Insecure Software: Study

February 24, 2016
Study of two million devices reveals that more than half are running outdated, vulnerable software.
READ MORE

Smart Buildings, Not So Smart Security? [PODCAST]

February 19, 2016
Smart buildings have some IoT security issues, finds IBM X-Force Security research.
READ MORE

4 Trends Drive FireEye Security Revenue Growth

February 12, 2016
Growing cybersecurity risk and complexity mean more business opportunity, says FireEye CEO.
READ MORE

PatternEx Debuts Virtual Analyst Platform for Security [PODCAST]

February 4, 2016
Uday Veeramachaneni, co-founder and CEO of PatternEx, discusses how his security startup aims to solve a security staffing challenge.
READ MORE

FinalCode 5 Takes Aim at File Encryption Challenge [PODCAST]

January 19, 2016
Scott Gordon, chief operating officer of Final Code, discusses the challenges of file encryption and what his company's new technology is all about.
READ MORE

Carrier Pre-Loads Expand Keeper's Mobile Password Footprint

January 14, 2016
Mobile password manager app continues to expand user base, thanks to new carrier partnerships.
READ MORE

How to Set up a Successful Bug Bounty Program [VIDEO]

January 8, 2016
What does it take to run a successful bug bounty program?
READ MORE

Software Defined Networking (SDN) = Security [VIDEO]

December 18, 2015
Software defined networking enhances security by creating micro-segmented networks that can provide isolation and limit the impact of data breaches.
READ MORE

UMass Masters Cyber Security Education

December 11, 2015
As threats mount, so too does the need for improved cyber security education.
READ MORE

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

December 8, 2015
Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.
READ MORE

Can Mobile Apps Defend Themselves? Yes, Says Bluebox

November 23, 2015
Bluebox's approach goes beyond providing just a security wrapper for mobile applications.
READ MORE

Docker Container Security: What's Next

November 18, 2015
Docker aims to improve container security with application scanning, user namespaces and other capabilities.
READ MORE

Adobe Patches 17 Flash Vulnerabilities in Latest Update

November 11, 2015
Adobe's Flash is still heavily favored as a top attack vector, so you'd better update ASAP.
READ MORE

Niara Goes with Flow for Security Analytics

November 9, 2015
Security analytics must go beyond server logs to the network packet level, says  Niara CEO.
READ MORE

FireEye CEO Sees New Phase of Cyber Threat Cycle

November 5, 2015
Detente in China's relationship with U.S. could slow security spending, but the long-term trend is still strong.
READ MORE

Privacy by Design Does Not Sacrifice Security

October 23, 2015
Big Data needs big privacy, says privacy expert at SecTor Security conference.
READ MORE

Google Chrome 46 Boosts Security

October 16, 2015
Google patches Chrome browser for 24 security issues
READ MORE