Sean Michael Kerner - Article Archives - Page 3

Immunio Embeds Security Directly into Applications

October 2, 2015
Instead of bolting on security, Canadian startup takes an innovative approach that embeds security directly into apps.
READ MORE

Niara Pushes Security Analytics Vision Forward [VIDEO]

September 25, 2015
After emerging from stealth mode, startup is finding some interesting results in the field.
READ MORE

Splunk Expands Security Tools with New Product Releases

September 22, 2015
Splunk Enterprise Security 4.0 and Splunk User Behavior Analytics debut.
READ MORE

Symantec Issues Fraudulent Google SSL Cert

September 21, 2015
Google's Certificate Transparency effort saves the day in case of improperly issued EV-SSL certificate.
READ MORE

IBM Cloud Security Enforcer Emerges from the Shadows

September 18, 2015
IBM is now entering the shadow IT detection game with a new service for the Cloud Access Security Broker marketplace.
READ MORE

Internet Bug Bounty Helps Secure Open Source and the Internet [VIDEO]

September 10, 2015
HackerOne co-founder and CTO Alex Rice  discusses what the Internet Bug Bounty is all about.
READ MORE

How Does Security Impact Employee Productivity?

September 9, 2015
Dell study examines enterprise security's impact on productivity.
READ MORE

How LinkedIn Scales Security [VIDEO]

August 27, 2015
Cory Scott, director of Information Security at LinkedIn, discusses how the business social network manages security even with a small team.
READ MORE

Why Microsoft Wants to Improve Open Source Security [VIDEO]

August 20, 2015
Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.
READ MORE

Using Passive DNS to Fight Cybercrime

August 14, 2015
Going after bad guys can lead to unintended Internet collateral damage, but Paul Vixie has some ideas on limiting the risk with DNS.
READ MORE

HP on Legal Hacking and the Law

August 13, 2015
HP's Zero Day Initiative buys a lot of security vulnerabilities from researchers – so how does it stay within the bounds of the law?
READ MORE

RFID Susceptible to Cloning, Other Hacks

August 12, 2015
As RFID usage grows, so too do tools to clone and abuse RFID signals.
READ MORE

FBI Details Takedown of Gameover Zeus Botnet

August 11, 2015
FBI agent explains how law enforcement worked with security vendors to bring down a major botnet operation.
READ MORE

HP ZDI Finds 100 Vulnerabilities in Adobe Reader

August 10, 2015
HP details how an attacker could potentially abuse Adobe Reader's JavaScript APIs.
READ MORE

Certifigate Flaw Exposes Android Users to Risk [VIDEO]

August 7, 2015
Remote diagnostic tools from OEMs that are supposed to help Android users, could instead be used to hurt them.
READ MORE

Black Hat Car Hackers Did It as a Hobby [VIDEO]

August 6, 2015
Hacking a Jeep wasn't part of their day jobs, explain Charlie Miller and Chris Valasek.
READ MORE

Google Doubles Down on Android Security at Black Hat

August 6, 2015
Google's Android security chief discusses Stagefright and more in Black Hat address.
READ MORE

Man in the Cloud Attack Leverages SaaS Vulnerability

August 5, 2015
Attackers could use SaaS service synchronization to steal your enterprise data.
READ MORE

Ziften Digs Deep for Security Visibility

August 3, 2015
Fresh off a $24 million funding round, security startup debuts ZFlow technology to connect the dots of security incidents.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|