App developers love using BaaS providers to store and host the data they collect from users, but researchers said it puts sensitive data in danger.
Don't let your NoSQL database security — or lack thereof — keep you up at night. Instead, work on securing your dream apps throughout development.
The latest TalkTalk hack could come with a hefty price tag for the Internet service provider — and major security implications for victims.
A new set of SAP HANA vulnerabilities could put corporate data at risk of severe, remote attacks and possible data breach if left unpatched.
Loyalty programs can bring big rewards to customers, but they also may make organizations more appealing to cybercriminals looking to steal data.
Security startup iboss just received $35 million in Series A funding from Goldman Sachs — can their anomaly detection offering help Sachs stay relevant?
As clients embrace cloud environments, firewalls come down and new types of users start accessing cloud data, introducing additional security challenges.
IBM Security Guardium Vulnerability Assessment can help solve a twofold problem faced by many enterprises: managing compliance and securing data.
Many legacy Web applications are still in use, but they need to receive a security overhaul if they are to remain viable in today's world.
The Ashley Madison data breach was one of the most notable of 2015 so far, and there are several security lessons buried in the scandalous headlines.