Trends

Does Your Organization Need a Chief Trust Officer? [VIDEO]

Many organizations today have a chief information security officer (CISO), and a growing...

Bromium vSentry Defends Enterprises with Microkernel Virtualization

For most of this year, security startup Bromium has been talking about the...

Why Are Web Applications a Security Risk?

As users have moved more of their activities to the Web, fraudsters have followed, devoting more of their attention to creating security...

HP: Users Need to Take Responsibility for Online Security

What's one of the biggest problems with online security today? Lack of personal...

How Does Biometric Authentication Work?

Have passwords outlived their usefulness? Take a look at some of the weak...

Security Tips from Bruce Schneier

Bruce Schneier knows a thing or two about security. The author of multiple books on cryptography, Schneier is widely considered to be...

Can Morality Improve Security?

This year, more than $22 billion in enterprise security products and services is...

Bromium Raises $26.5 Million, Details Micro Virtualization Approach to Security

Security startup Bromium is emerging out of the shadows with piles of cash...

The Changing Role of the CISO

A new study from IBM has identified three types of Chief Information Security Officers (CISO) -- and all of them are experiencing...

Detecting Malicious Traffic in HTTP Headers

In the battle against malicious traffic and infected websites, security researchers are always...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...