Threat Intelligence August 4, 2015 Epic Hacks and High Jinks at Black Hat 2 min read - The high jinks and hacking demonstrations that go on during the Black Hat USA conference are the stuff of legend. Catch up on the most prolific examples.
July 24, 2015 Can Tokenization Overcome the Biggest Concerns About Biometric Authentication? 2 min read - HYPR released a biometric authentication SDK that would let third parties overlay fingerprint and voice recognition over other security processes.
CISO July 8, 2015 Looking Ahead: CISO Strategies for 2020 3 min read - Certain CISO strategies will ensure an enterprise is poised to meet the challenges associated with new tech advancements, from mobile to cloud.
Endpoint June 23, 2015 Don’t Overlook This Key Element in Securing the Internet of Things 2 min read - You absolutely must think long-term when it comes to the Internet of Things (IoT) because these systems aren't going anywhere anytime soon.
June 17, 2015 Kickstarter Crowdfunding Case Sends a Simple Message: Caveat Emptor 2 min read - A new FTC ruling on its first-ever crowdfunding case sends a simple message: Creators are responsible for money management, but buyers must beware.
Application Security May 13, 2015 The Application Economy and the Challenges of the Internet of Things 5 min read - Are technologies such as the Internet of Things putting businesses at risk? Can the application economy create opportunities that can be safely harnessed?
May 7, 2015 Do No Harm? Medical Device Vulnerabilities Put Patients at Risk 2 min read - Hospitals now rely on medical device technology to improve care outcomes, but are security flaws in these devices putting patients at risk?
Application Security March 31, 2015 Mobility and IoT Security: Why Manufacturers Need to Change Their Mindset 3 min read - With the rise of wearables, the expansion of the smart-home ecosystem and the advent of driverless cars, IoT security should no longer be an afterthought.
Intelligence & Analytics March 5, 2015 Internet of Things: Can We Find a Balance Between Security and Convenience? 4 min read - If manufacturers build security into their IoT devices, hopefully we can all enjoy the benefits of IoT without being spied on by hacker Big Brothers.
Intelligence & Analytics February 9, 2015 Do We Need New Security Tools for the IoT? 3 min read - As the IoT becomes more prevalent, enterprises must improve their mobile device protection programs by strengthening their security controls.