Without multi-factor authentication (MFA), antivirus software, firewalls, encryption technology, and vulnerability tests can be bypassed.
Hackers have gotten more advanced, and so should data security approaches. Read about three new data security technologies that may soon be in use.
Automated application analysis tools offer the data and intelligence programmers need to find software bugs before they turn into security...
The FTC's liability ruling against Wyndham Worldwide has taught three valuable lessons about corporate liability in cyber attacks.
Dropbox is a prime example of the security risks associated with shadow IT. Here's what the rise of Dropbox has taught us about securing data in...
The "API economy" is luring many businesses in, but experts warn that security is lacking and API risk is growing. Here are 3 steps to better...
These seven common vulnerability management mistakes can lead to disaster. Here's how to learn from others' mistakes.
Smartwatch sales could reach 100 million by 2020, with Apple leading sales in the market. The experts weigh in on vulnerabilities in smartwatch...
The reality of the Office of Personnel Management (OPM) hack and best practices for mitigating risk
TRUSTe's Ken Okumura talks about common security mistakes developers make, coding with privacy in mind, and how to find the right talent.

Pages