Dissecting Windows 10 Security

Dissecting Windows 10 Security

New features such as the Antimalware Scan Interface, Virtualization-Based Security and threat analytics are making Windows much more difficult to exploit, but hackers and researchers demonstrate it's still not impossible.

When to Take a Bug Bounty Program Public -- and How to Do It

When to Take a Bug Bounty Program Public -- and How to Do It

Bug-finding programs are valuable to enterprises, but they require a lot of planning and effort to be effective. Sean Martin looks at what goes into taking a bug bounty program public.

How to Start Building an Enterprise Application Security Program - Part 1

How to Start Building an Enterprise Application Security Program - Part 1

Building an effective application security program can be daunting. Sean Martin talks with experts about the best first steps enterprises should take.

CISO Cybersecurity Blind Spots: Mitigating Risks and Vulnerabilities

CISO Cybersecurity Blind Spots: Mitigating Risks and Vulnerabilities

Cybersecurity blind spots based in risk and vulnerabilities can be difficult to spot and address. Sean Martin talks with security experts on how to overcome that challenge.

Bug bounty programs narrow the crowd

Bug bounty programs narrow the crowd

Data shows that more companies are moving away from crowdsourcing and adopting invitation-only awards programs. Do higher-quality submissions result?

11 Tips for Spotting Insider Threats

11 Tips for Spotting Insider Threats

In this Network World exclusive, I've collected advice from 11 security experts aimed at helping companies detect an insider attack sooner rather than later.

Cybersecurity professionals: Five ways to increase the talent pool

Cybersecurity professionals: Five ways to increase the talent pool

The lack of cybersecurity skills in the industry is glaring, but there are ways for educators, vendors and enterprises to fix the problem. Sean Martin explains how.

Inside the Minds of Bug Bounty Researchers

Inside the Minds of Bug Bounty Researchers

An intimate look at what makes a bug bounty run – payouts, notoriety, good will? Sean Martin investigates in this IT Security Planet exclusive.

The Need for a New Security Fabric - Specifically for a World Filled with IoT

The Need for a New Security Fabric - Specifically for a World Filled with IoT

The Internet of Things (IoT) and the rest of the world’s already-connected devices pose a serious cyber risk to our personal, corporate, and national interests. We thus need to weave a new fabric of security if we are to ensure security, privacy, and safety in an always-connected world.