March 5, 2015 Publicly Stored Security Key May Have Enabled Uber Data Breach 2 min read - A recent data breach at Uber may have been enabled by a security key stored on a public GitHub page, according to a lawsuit filed by Uber.
Application Security March 5, 2015 Q&A: Assessing and Addressing Enterprise App Security 4 min read - In this Q&A, IBM's Kaushik Srinivas and Anar Taori give the lowdown on the state of app security and how to keep the enterprise safe from potential harm.
March 5, 2015 Cyber Resiliency: Are Mobile Apps the New Fallback? 3 min read - As organizations work to boost their cyber resiliency to recover from attacks, mobile apps may be the newest security measure that can protect them.
Data Protection March 4, 2015 Data Security: How Vulnerable Is Your Critical Data? 2 min read - Data security today requires a holistic approach that caters to customer concerns and leverages cloud, mobile, social and big data with confidence.
Endpoint March 3, 2015 How to Stay Off the Data Breach List 3 min read - In the wake of several damaging incidents in 2014, organizations must implement security solutions and controls to avoid being the victim of a data breach.
Intelligence & Analytics March 3, 2015 Cyber Forensics: From Dark Arts to Common Practice 2 min read - Organizations' security teams can use cyber forensics to better respond to increasingly sophisticated and advanced security threats.
Endpoint February 28, 2015 Could Your SSH Keys Become Stolen Credentials? 3 min read - SSH keys are valuable to cybercriminals because stolen credentials can be used to access critical servers. Here are some facts regarding the issue.
Healthcare February 26, 2015 Healing the Wounds Caused by Health Care Fraud and Health Insurance Fraud 3 min read - The health care and insurance sectors are under pressure to safeguard their operations in the light of rising health insurance fraud threats.
Application Security February 26, 2015 Software Asset Management: Why It Makes Security Sense 2 min read - How does software asset management (SAM) relate to keeping your data secure? As cybersecurity escalates, so does your software management responsibility.
February 26, 2015 Researchers: Adtrustmedia’s PrivDog Advertising Software Leaves Some Users at Risk 2 min read - PrivDog, the advertising software offered by Adtrustmedia, may be breaking SSL security in ways that compromise user security.