dcsimg

Sean Michael Kerner - Article Archives - Page 7

IBM Patents Browser-Based Fraud Detection Technology

May 28, 2014
What you do in your browser now forms a second factor of authentication for e-commerce transactions, thanks to IBM.
READ MORE

IBM Takes Aim at Endpoint Security with Trusteer Apex

May 23, 2014
In a world where anti-virus is no longer entirely effective, IBM launches new technology to secure endpoint devices.
READ MORE

How Should Enterprises Score Security? [VIDEO]

May 5, 2014
Qualys CTO Wolfgang Kandek discusses his firm's Web application firewall and security scoring efforts and hints at future security technologies to come.
READ MORE

[VIDEO] Where Are Database Threats Today?

April 28, 2014
Amichai Shulman, CTO of Imperva, explains why SQL injection is not a database threat and discusses the current state of Oracle database patching.
READ MORE

[VIDEO] Dr. Larry Ponemon on How Security Survey Research Is Done

April 23, 2014
Head of the Ponemon Institute details the process and the challenges of conducting modern security surveys.
READ MORE

How to Limit Heartbleed Risk Today

April 17, 2014
What can you do to reduce your risk from Heartbleed? eSecurity Planet has got you covered.
READ MORE

ATMs on Windows XP: How Risky Is It?

April 11, 2014
Microsoft has ended official support for Windows XP. What does that mean for the security of the world's ATMs, most of which run XP?
READ MORE

Does Your Organization Need a Chief Trust Officer? [VIDEO]

April 8, 2014
VIDEO: Bob West, chief trust officer at CipherCloud, discusses his role and explains why every organization should consider appointing a chief trust officer.
READ MORE

VIDEO: Is Cognitive Injection the Key to Real Security?

March 18, 2014
Andy Ellis, chief security officer at Akamai, thinks that taking a positive approach to security tasks will result in better security outcomes.
READ MORE

VIDEO: Bruce Schneier on Incident Response and His Next Book

March 13, 2014
Bruce Schneier explains the role that incident response technology should play in the modern IT security landscape.
READ MORE

Touchlogging Represents a Real Mobile Risk

March 7, 2014
Trustwave researcher warns about the risk of touchlogger applications on IOS and Android
READ MORE

Can Cloud Services be Exploited to Aid Attackers?

March 6, 2014
Researchers reveal how they can leverage free cloud services as an efficient attack platform without spending any money.
READ MORE

Inside the U.S Department of Homeland Security's Network

March 4, 2014
Head of National Cybersecurity Protection System explains where DHS is making investments to defend the U.S federal government's network.
READ MORE

Chinese Government Hacking, One Year Later

March 3, 2014
What has changed in the year since Kevin Mandia first exposed hacking by the Chinese Army?
READ MORE

RSA: Privacy, Secrecy Are Not Synonymous

February 28, 2014
Privacy officers from Google, Microsoft and Intel Secret discuss privacy in the modern world at this week's RSA conference.
READ MORE

RSA: Enterprise Security's Sucker Punch

February 27, 2014
Addressing RSA attendees, IDC analysts detail outlook for the current and future IT security landscape.
READ MORE

Is Virtualization Hypervisor a 'Goldilocks Zone' for Security?

February 26, 2014
VMware aims to position the hypervisor as the 'just right' place to do security.
READ MORE

CA Aims to Improve API Security

February 24, 2014
Modern Web and mobile apps tend to use external resources, often called via an API, making the API a critical control point for security. That is why CA is addressing API security with new products.
READ MORE

Zscaler Shifts to DNS to Protect Enterprises

February 21, 2014
Sometimes a full Web proxy is too much, and all you need is DNS re-direction to provide security.
READ MORE