How First Citrus Bank got rid of employee passwords
The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones.
What is GPS spoofing? And how you can defend against it
The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here’s…
Google expands cloud security capabilities, including simpler configuration
New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their…
What is AI fuzzing? And why it may be the next big cybersecurity threat
Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and…
What is quantum cryptography? It’s no silver bullet, but could improve security
In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just…
What is biometrics? And why collecting biometric data is risky
Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric…
How security operations centers are adapting to the cloud era
Moving data and processes to the cloud presents challenges for enterprise SOCs. Here’s how the industry and business are finding new ways to collect, monitor…
8 old technologies that still play roles in security
Newer isn’t always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems.
Best antivirus software: 14 top tools
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.
DDoS protection, mitigation and defense: 8 essential tips
Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.
What is the cyber kill chain? Why it's not always the right approach to cyber attacks
As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent…
Why the best antivirus software isn’t enough (and why you still need it)
Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.
Why even the best antivirus software isn't enough (and why you still need it)
Traditional signature-based antivirus is notoriously bad at stopping newer threats such as zero-day exploits and ransomware, but it still has a place in the enterprise,…
Best antivirus software: 13 top tools
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.
What is enterprise risk management? How to put cybersecurity threats into a business context
Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.
7 best practices for working with cybersecurity startups
Cybersecurity startups, not weighed down by legacy platforms, can be more nimble and innovative than their more established competitors, and can often offer more personalized…
4 top challenges to a secure digital transformation
Improving cybersecurity is becoming a driving factor for starting digital transformation projects. Mistakes in implementation, however, can be costly.
What are next generation firewalls? How the cloud and complexity affect them
Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in…
Corporate pre-crime: The ethics of using AI to identify future insider threats
To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors.…
3 reasons companies fail to assess the scope of a data breach
First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen records were missed the first…
California Consumer Privacy Act: What you need to know to be compliant
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
5 ways to hack blockchain in the enterprise
Experts warn of blockchain security risks in non-cryptocurrency use cases.
Hardware, software options emerge for runtime encryption
Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.
Cloud functions present new security challenges
Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?
How privacy is moving data security to the top of corporate agendas
It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.
Why securing containers and microservices is a challenge
Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.
Verizon report: Ransomware top malware threat of 2017, moving into critical systems
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
How to detect and prevent crypto mining malware
Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great…
Open source software security challenges persist
Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take…
SEC’s new cybersecurity guidance falls short
Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will…