12 AppSec Activities Enterprises Can't Afford to Skip The latest Building Security in Maturity Model (BSIMM9) report offers a statistically backed, bare-minimum benchmark for software security initiatives.
Most Home Routers Are Full of Vulnerabilities More than 80% of surveyed routers had, on average, 172 security vulnerabilities, new research shows.
Successful Scammers Call After Lunch Analysis of 20,000 voice phishing, or vishing, calls reveals patterns in how social engineers operate and how targets respond.
Who Do You Trust? Parsing the Issues of Privacy, Transparency & Control Technology such as Apple's device trust score that decides "you" is "not you" is a good thing. But only if it works well.
7 Steps to Start Your Risk Assessment Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.