Frequent Software Releases, Updates May Injure App Security

The more frequently you release apps, the more security vulnerabilities you are likely to introduce in the code, a new study confirms.

Emerging IT Security Technologies: 13 Categories, 26 Vendors

A rundown of some of the hottest security product areas, and vendors helping to shape them.

New Banking Trojan Similar to Dridex, Zeus, Gozi

IBM researchers uncover a new form of banking malware distributed as a second-stage infection via the Emotet Trojan.

Optiv Buys Conexsys for Canadian Market Growth

Optiv ramps up its growth strategy with an acquisition of Conexsys, security and networking firm based in Toronto.

How to Leverage the Rosetta Stone of Information Sharing

A common framework will help in the development of cyber-risk management efforts.

New Locky Ransomware Takes Another Turn

A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.

Google Updates Chrome to Prevent Unwanted Content, Redirects

Changes to Google Chrome aim to prevent users from being redirected to unexpected websites and unwanted content.

Why Common Sense Is Not so Common in Security: 20 Answers

Or, questions vendors need to ask themselves before they write a single word of marketing material.

6 Steps for Sharing Threat Intelligence

Industry experts offer specific reasons to share threat information, why it's important - and how to get started.

Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches

Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.

AV Vendors Have Immunity for Malware-Blocking Decisions, Court Says

Enigma Software Group had sued Malwarebytes for characterizing its anti-malware software as unsafe, but its case was dismissed.