dcsimg

Sean Michael Kerner - Article Archives - Page 6

Veracode Gears up for Security IPO

October 8, 2014
Veracode CEO explains what his company is doing now as he heads toward a public offering.
READ MORE

An Open Source Solution to Shellshock

October 1, 2014
An open source tool can mitigate risks associated with Bash shell attack.
READ MORE

No Silver Bullet for Use-After-Free Flaws [VIDEO]

September 22, 2014
Bromium's chief security architect discusses modern security flaws and warns about dangerous malvertising threat.
READ MORE

IBM Brings Bare Metal Intel TXT Security to Cloud

September 9, 2014
The cloud isn't just about virtual servers. The physical layer and its security still matter, which is why IBM is using Intel's Trusted Execution Technology.
READ MORE

Security Research and the Law: What You Need to Know

August 15, 2014
Security researchers must navigate a minefield of U.S. laws and statutes, such as the Computer Fraud and Abuse Act.
READ MORE

How to Detect SSL Leakage in Mobile Apps

August 13, 2014
LinkedIn researchers find piles of SSL configuration flaws in mobile apps and so can you.
READ MORE

DefCon: Advice on Evading Black Helicopters

August 11, 2014
You say 'paranoid,' I say 'careful.' Expert offers 'practical' advice on living the paranoid lifestyle.
READ MORE

Yahoo CISO Details Challenge of Security at Scale

August 8, 2014
Security vendors focus on banks not Web-scale companies, says Yahoo CISO Alex Stamos.
READ MORE

Backoff PoS Malware Demonstrated at Black Hat [VIDEO]

August 7, 2014
Trustwave researchers demonstrate Backoff malware, which targets POS systems, at Black Hat. Attack that has compromised 600 retailers relies on Java.
READ MORE

Buy All the Cybersecurity Vulnerabilities: Black Hat Keynote

August 6, 2014
Black Hat keynote speaker Dan Geer has some radical ideas to reshape modern security, including a suggestion that the United States purchase security vulnerabilities and make them public.
READ MORE

Using Military Strategy to Fight Cyber Battles

August 6, 2014
What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason.
READ MORE

SaaS Security Risks: It's the Users, Stupid

August 5, 2014
Black Hat workshop to discuss security concerns of software-as-a-service applications. Not surprisingly, uninformed users pose some of the biggest risks.
READ MORE

IBM Expands Security Portfolio with CrossIdeas Acquisition

July 31, 2014
CrossIdea technology will give IBM more capabilities to evaluate and access risks.
READ MORE

New ThreatStream CEO Wants to Solve SIEM Challenge

July 28, 2014
ArcSight founder joins security vendor to fill gaps that SIEM doesn't solve.
READ MORE

Google Project Zero Focuses on Internet Security

July 17, 2014
Months after reporting its first vulnerabilities, Google officially acknowledges the existence of a shadowy security group known as Project Zero.
READ MORE

How to Reduce Use-After-Free Memory Risk

July 14, 2014
Use-after-free memory errors often crop up in software application code.
READ MORE

Boleto Malware Hits Brazil Payment System

July 10, 2014
New IBM Trusteer research finds new variants of malware used to exploit Brazil's Boleto payment system.
READ MORE

Bromium CTO Explains Promise of Secure by Design

June 20, 2014
Simon Crosby, Co-founder and CTO of Bromium, details his company's progress to deliver a Byzantine Fault Tolerant security solution
READ MORE

HP Atalla Tackles Encryption in the Post-Snowden Era

June 12, 2014
The need for encryption now is greater than ever.
READ MORE