Government April 29, 2015 Feds Move Toward HTTPS Website Encryption 2 min read - A new policy announced by the White House in March requires federal websites to support traffic encryption within two years through HTTPS.
April 28, 2015 Startup Says AC Power Could Be the Secret to Spotting Medical Device Malware 2 min read - A startup demoed technology at the recent RSA Conference that shows how AC power could detect medical device malware and fend off cybercriminals.
April 28, 2015 Bodyprint Biometrics: Are People the New Password? 2 min read - Yahoo has introduced a new type of biometric security, Bodyprint, which allows users to unlock their mobile devices with multiple body parts.
CISO April 28, 2015 C-Suite Spotlight: Maximus VP Jamie Giroux < 1 min read - Jamie Giroux of Maximus, a managed health care, human services and workforce management solutions provider, discusses the state of security.
Application Security April 28, 2015 Software Defenses to OWASP’s Top 10 Most Common Application Attacks 6 min read - Software developers must learn how to build security in from the ground up to defend against the most common application attacks, as determined by OWASP.
Mainframe April 28, 2015 Study: Basic Needs Critical Infrastructure Sectors Account for 8 Percent of All Incidents in 2014 2 min read - According to a recently released IBM study, the basic needs critical infrastructure sectors accounted for 8 percent of all security incidents in 2014.
April 27, 2015 Microsoft Bug Bounty Program Offers Big Rewards for Finding Flaws in Project Spartan, Windows 10 2 min read - Security researchers are invited to submit vulnerability reports and a functioning exploit in return for cash as part of the Microsoft bug bounty program.
CISO April 27, 2015 Security Management: Embracing Millennials in Your Security Program 4 min read - Security management teams can benefit from millennial employees if they take steps to attract top talents and retain them with unique benefits.
X-Force April 27, 2015 Threat Intelligence Sharing: The First Steps 2 min read - Threat intelligence sharing is gaining acceptance and momentum in the security community. Here are a few suggestions to get started on the right foot.
Endpoint April 27, 2015 Data and Content Security for the Mobile-First World 3 min read - Employees and enterprises are operating in an increasingly mobile-first world. Because of this, content security is of the utmost importance to executives.