December 27, 2017 Survey Says: AI Speeds Security Operations 2 min read - Existing software systems are slowing down security teams. How can information security professionals bridge the gap and improve response speed?
Endpoint July 17, 2017 How Virus Protection Software Has Evolved With the Threat Landscape 3 min read - Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.
June 7, 2017 Cold Comfort: Outdated Software Puts Companies in the Hot Seat 2 min read - Outdated software offers familiarity for IT teams, but that's cold comfort when it comes to the hot seat of legal challenges and ransomware infections.
Application Security March 27, 2017 Three Lessons From Test-Driven Development 3 min read - Test-driven development was created to inspire security analysts and developers to reconsider the way they plan, design and test software.
Intelligence & Analytics February 17, 2016 Supporting Data Security Analytics With a Software Inventory Solution 2 min read - Enterprises may be devoting a lot of resources to software licenses and maintenance, but they can locate these areas of inefficiency with new solutions.
Application Security April 28, 2015 Software Defenses to OWASP’s Top 10 Most Common Application Attacks 6 min read - Software developers must learn how to build security in from the ground up to defend against the most common application attacks, as determined by OWASP.
April 14, 2015 Gartner: IBM Security Growth Outpacing the Overall Security Software Market < 1 min read - The growth of IBM Security is outpacing the overall security software market by nearly three times, according to a recently released report from Gartner.
Healthcare April 2, 2015 How Software-Defined Perimeter Can Help Secure the Clinical Environment 4 min read - The Cloud Security Alliance's Software Defined Perimeter could be a valuable resource for health care providers trying to protect their clinical network.
March 5, 2015 Lenovo Superfish Scandal Prompts Probe, Promise to Reduce Preinstalled Software 2 min read - Lenovo says it is changing what it puts on its machines to avoid another Superfish scandal, even as a state attorney general's office probes the firm.
CISO August 4, 2014 Building Cyber Security Right From the Start 2 min read - Cyber security and privacy protection need to be built into the design of systems, not added as an afterthought, in order to properly protect them.