There's plenty of opportunity for security pros, but there's a shortage of them to fill spots. John Mello reports on what the security skills gap...
The use of encryption has become pervasive in the enterprise. That's why allowing anything but the strongest encryption would have far-reaching...
The Cybersecurity Information Sharing Act (CISA) holds great promise. But will liability concerns foil it? Will CISA actually work? Only time will...
Taking a risk-managed approach to security has strategic advantages. Danny Rogers says dark web data intelligence is key to finding and stopping...
By executing a risk-based assessment, you can create efficient penetration testing plans that concentrate efforts where they're needed most. Here's...
Forget patching and rule-based security tools; move to something that protects endpoints regardless of exploit type or whether the endpoint has the...
Would backdoors actually help to solve crimes? After several weeks of researching Klaus Schmeh concludes they are no silver bullet for police...
With attackers having shifted their focus from servers and operating systems directly to applications, coding libraries are in the hot seat over...
Test your entire app environment a little bit at a time, and it will add up to positive results. Kevin Beaver explains how relentless...
Developers want to do the right things for security, but what are those things? It's a big challenge. 4 steps can make your developers be better at...

Pages