DevOps and security. There's still no standard, or even agreed upon name, but two things are clear: DevOps is here to stay and security must be...
Here is a roundup of best practices from leading security experts to help developers get up to speed on thinking app sec-first.
Passwords may not offer the most secure form of authentication but there are several measures developers can take to make them more robust and...
The distributed database technology behind bitcoin can be cost effective for enterprise applications —but not always.
Security holes in devices and new guidance from DHS are on the agenda at the Security of Things Forum
Limiting the number of keys in the system because the key server can't handle enough is too risky. If you don't believe me, wait until you read...
More patching is not the answer. Neither is hoping that software vulnerabilities will simply go away. A true security/business balance can only be...
Recent research conducted on Android security apps by Stephan Huber and Siegfried Rasthofer found that, rather than improving mobile security, mobile antivirus products from leading vendors contain major security vulnerabilities....
Bitcoin uses a blockchain. Should you? Luther Martin explains the fundamental benefits and drawbacks of using the blockchain distributed database...
As enterprises demand that more and more data be encrypted, having a centralized key management strategy is critical. Here's how to manage all of...

Pages