Features Taming the third-party threat: Application security By Alan Earls Publish Date April 1, 2015 The challenge for security practitioners is to make the mobile ecosystem more trustable, reports Alan Earls.
Features Reboot 25: Threat seekers By Adam Greenberg Publish Date December 8, 2014 These explorers' findings of critical vulnerabilities - from Heartbleed to Shellshock - have generated excitement, along with awareness, and made an indelible mark on security.
Features Safe tether: Wearables By Alan Earls Publish Date November 3, 2014 Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
Features On the go: Mobile security By Greg Masters Publish Date February 1, 2010 An explosion in smartphones, laptops, USB sticks and other portable devices has brought new security challenges, reports Greg Masters.