Analysis

Are home security cameras ready for business use?
Thinking of buying a consumer IP camera for use as a surveillance system in your business? Read this first.
Blockchain shows open source’s fatal flaw—and a way forward

Open source usage has skyrocketed, but not the number of developers working on projects. Those who benefit need to pay developers to keep it all going

Debunking 4 common password security myths

Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.

Why FireEye’s Helix matters to security professionals

Its Sandbox will be the core product for FireEye into the foreseeable future, but Helix will be an important adjacent market for the company and its customers. Here's why.

WannaCry ransomware explained: What it is, how it infects, and who was responsible

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

Heartbleed: A coding error that caused a security crisis

Here's how Heartbleed works, how it was exploited, and how to fix it if you have an unpatched server.

The 16 biggest data breaches of the 21st century

Security practitioners weigh in on the 16 worst data breaches in recent memory.

What day of the week are cyber criminals more likely to strike?

You can reduce potential damage by paying attention to when attackers are most likely to strike.

Game of Thrones: The leaks that made headlines

Since its inception, the flagship HBO show has been plagued by hackers, paparazzi and fans constantly trying to leak its content.

Amazon Macie automates cloud data protection with machine learning

Amazon promises AWS S3 customers that they will be able to identify and protect sensitive data faster with Macie, but is it enough to catch up to what Microsoft and Google offers?

Android vs iOS: Which is more secure?

While all mobile devices have inherent risks, Android has more vulnerabilities because of its open-source nature, the slow pace with which users update the OS and a lack of proper app vetting.

IoT security for healthcare is in critical condition

Medical devices lack many features and capabilities that help protect other network-attached devices from attack.