A new report finds companies share common cybersecurity vulnerabilities. Can this common ground be used to enhance network security?
An Adobe Flash Player exploit has reappeared after it was thought to be mitigated in a recent patch. What's the risk for users of this popular program?
Security hygiene becomes exponentially more difficult as the Internet of Things expands the number of smart devices connected in an enterprise.
Looking for the best way to encrypt Windows drives? Take a pass on open-source TrueCrypt, which was recently found to have critical flaws.
10 Convenient Ways to #CoverYourApps and Increase Application Security Testing Knowledge in Your Organization
Here are 10 ways you can improve your application security testing knowledge and posture — without a massive investment of time or money.
System admins can never be sure of where the next online attack will come from, which is why Yahoo has released a new Web application security scanner.
Many companies are now considering their own bug bounty program, and HackerOne has designed a free assessment tool to get the ball rolling.
Seemingly simple security flaws can cause major damage for organizations, most often in the form of massive data breaches caused by the vulnerability.
Many organizations struggle to find the right authentication methods for their employees and needs, but they can ill afford to let malpractice continue.
It wasn't all that long ago that Windows XP was present in the vast majority of enterprises. In fact, it's still prevalent, bringing many security risks.