×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Sean Michael Kerner - Article Archives - Page 8

Can Hacker Techniques Defend Financial Security?

February 6, 2014
At the upcoming RSA Security conference, researchers from Trustwave will detail how financial institutions can use lessons learned from hacker techniques to boost security.
READ MORE

Securing Apps Starts with Code: Sonatype

January 28, 2014
Sonatype's updated component lifecycle management solution takes aim at the risk of vulnerable open-source software components.
READ MORE

'Air Gap' Attack Is Real Threat

January 24, 2014
Can sound (not RF or radio waves, but sound) be used to infiltrate and control a PC in a so-called air gap attack?
READ MORE

PCI Compliance Lacking Among Small Businesses

January 14, 2014
New report shows less than stellar adoption rates for compliance with the PCI Data Security Standard among SMBs. What's going on?
READ MORE

Report: Web Is Largest Source of Malware

January 13, 2014
Most malware infections come from the Web, making it more dangerous than social media or email, according to a Trustwave study.
READ MORE

FireEye Acquires Mandiant for $1 Billion

January 3, 2014
Security firms come together in a bid to improve real-time threat detection and response.
READ MORE

Security Big Part of Data Center Modernization Plans

December 16, 2013
As enterprises look to modernize their data centers, security tops the list of anticipated benefits, finds a new study from Palmer Research and QuinStreet Enterprise. At the same time, it presents some key challenges.
READ MORE

Linux Foundation Aims to Secure Internet of Things

December 10, 2013
The key to securing the Internet of Things could be in making sure that everything isn't actually connected to the Internet.
READ MORE

Microsoft Battles ZeroAccess Botnet

December 9, 2013
Microsoft and its partners in law enforcement aim to disrupt the ZeroAccess botnet, one of the most robust botnets in operation today.
READ MORE

Is Docker the Future of Virtualization Security?

December 4, 2013
Video: Ben Golub, CEO of Docker, explains how Linux container technology presents a very different model for virtual security.
READ MORE

Akamai Beefs up DDoS Security with Prolexic Buy

December 2, 2013
Akamai is paying $370 million to add a missing piece to its security portfolio, enabling full Web application and data center Distributed Denial of Service protection.
READ MORE

How Was SQL Injection Discovered?

November 25, 2013
The researcher once known as Rain Forrest Puppy explains how he discovered the first SQL injection more than 15 years ago.
READ MORE

iOS Point-of-Sale Devices Pose Security Risk

November 20, 2013
New research considers security implications of mobile point-of-sale applications on Apple's iPhones and iPads.
READ MORE

IBM Expands Cybersecurity Education

November 15, 2013
IBM is doing its part to address a lack of skilled professionals in the cybersecurity industry.
READ MORE

Apple Secures Mac OS X with Mavericks Release

October 25, 2013
Apple's OS X 10.9 update provides a long list of new security features and fixes that aren't in the 10.8 release.
READ MORE

IBM: CISOs Don't Get BYOD

October 22, 2013
The 2013 IBM Chief Information Security Officer Assessment identifies a few areas of weakness, including BYOD policy, in modern IT security.
READ MORE

Is the Breach Quadrilateral the Key to Understanding Security?

October 10, 2013
Speaking at the SecTor conference, Trustwave exec details the four steps that are part of every breach.
READ MORE

Adobe Breach: Was Source Code Real Target?

October 4, 2013
Adobe admits it was the victim of an attack that stole information on 2.9 million customer accounts.
READ MORE

Black Hat: Android Master Key Vulnerability Makes Us Safer

August 1, 2013
When is an Android security flaw a good thing? When it makes us safer, says researcher during his Black Hat presentation.
READ MORE