Security | News, how-tos, features, reviews, and videos
Passwords may not be dead, but the latest NIST guidelines promises a less frustrating and more secure authentication future
Shodan is now offering the Malware Hunter scanning tool, which uncovers systems manipulated to control malware-infected devices
Phishing, malware, ransomware, hacking, cyberespionage: The latest Verizon Data Breach Investigations Report shows the best prevention is basic security hygiene
A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs
Google outlines how BeyondCorp determines whether a device should be allowed to access an application in a perimeter-less network environment
The distributed ledger technology has enormous potential for firms that figure out how best to use it
You can write the best code in the world, but if you use vulnerable libraries and frameworks, you're introducing serious security problems to your application
Cybercriminals don’t operate in the Dark Web only; they also rely on popular communications software such as Skype, WhatsApp, Jabber, and Signal
If you're worried about zero-days and hacking tools but not outdated software and obsolete systems in your network, then you're doing security wrong
Third-party container security tool can now help organizations enforce HIPAA or PCI rules on containerized apps