contributed

Top Factors Driving Endpoint Security Strategy

Antivirus Software is dying. What will replace it?

In this industry perspective, Dan Larson of the firm CrowdStrike argues that antivirus software is becoming less effective at stopping damaging cyber attacks, but that companies need to look before they leap when replacing it. 

The Spectrum of Mobile Risk: Protecting Your Corporate Data

The Spectrum of Mobile Risk: Protecting Your Corporate Data

In-brief: organizations need to better understand mobile risks if they want to protect critical data, writes Aaron Cockerill of the firm Lookout. 

Heartbleed’s Heartburn: Why a 5 Year Old Vulnerability Continues to Bite

Heartbleed’s Heartburn: Why a 5 Year Old Vulnerability Continues to Bite

In-brief: more than three years after it was first discovered, the Heartbleed vulnerability in OpenSSL continues to plague organizations worldwide. Why has it been so hard to fix? In this Industry Perspective, Patrick Carey of the firm Black Duck talks about some of the complicating factors that make vulnerabilities like Heartbleed so hard to eradicate. 

Identity at Scale: how the Internet of Things will Revolutionize Online Identity

Identity at Scale: how the Internet of Things will Revolutionize Online Identity

In-brief: Far from ‘breaking’ the public key encryption (PKI) model, the Internet of Things is poised to turbocharge PKI adoption and revolutionize online identity, DigiCert* CTO Dan Timpson writes.

Tallinn, Estonia's Capital City

Estonia 10 Years Later: Lessons learned from the World’s First Internet War

In-brief: Gadi Evron recalls the denial of service attacks aimed at the government of Estonia in 2007 – one of the first recognized acts of ‘cyber war’ and a template for incidents that followed. Evron says there were many lessons in that incident – some of which the U.S. and its allies are still struggling to learn.