April 27, 2015 Microsoft Bug Bounty Program Offers Big Rewards for Finding Flaws in Project Spartan, Windows 10 2 min read - Security researchers are invited to submit vulnerability reports and a functioning exploit in return for cash as part of the Microsoft bug bounty program.
CISO April 27, 2015 Security Management: Embracing Millennials in Your Security Program 4 min read - Security management teams can benefit from millennial employees if they take steps to attract top talents and retain them with unique benefits.
X-Force April 27, 2015 Threat Intelligence Sharing: The First Steps 2 min read - Threat intelligence sharing is gaining acceptance and momentum in the security community. Here are a few suggestions to get started on the right foot.
Endpoint April 27, 2015 Data and Content Security for the Mobile-First World 3 min read - Employees and enterprises are operating in an increasingly mobile-first world. Because of this, content security is of the utmost importance to executives.
Security Services April 24, 2015 Security Management: Critical Capabilities for Compliance and Security Intelligence 2 min read - Increased cyberthreats and compliance regulations are requiring organizations to pay more attention to their security management strategy.
Data Protection April 24, 2015 Top Tips for Surviving a Data Encryption Project 3 min read - Encrypting your data is an important step for keeping it secure. Follow these tips to keep your data encryption project running smoothly.
April 23, 2015 Vulnerability in Magento Could Have Exposed 200,000 E-commerce Sites to Attack 2 min read - A vulnerability in Magento — the e-commerce platform owned by eBay — was patched but could have left more than 200,000 sites exposed to cybercriminals.
April 23, 2015 Research Suggests Being Hit by Mobile Malware Is as Rare as Being Struck by Lightning 2 min read - Damballa unveiled results of a two-year study at the RSA Conference that showed mobile malware threats may be overhyped — as rare as a lightning strike.
X-Force April 23, 2015 The Game Is Afoot: Threat Intelligence Spans Machines to Automate Defensive Reactions 3 min read - Defenders must share threat data and methods across organizations and industries. Threat intelligence requires a common machine-readable format.
April 22, 2015 PayPal Suggests Biometric Identification Will One Day ‘Kill All Passwords’ 2 min read - A login mechanism you could eat, digital tattoos and vein recognition could be among the biometric identification tools that protect users, PayPal says.