Bug bounty programs narrow the crowd

Bug bounty programs narrow the crowd

Data shows that more companies are moving away from crowdsourcing and adopting invitation-only awards programs. Do higher-quality submissions result?

11 Tips for Spotting Insider Threats

11 Tips for Spotting Insider Threats

In this Network World exclusive, I've collected advice from 11 security experts aimed at helping companies detect an insider attack sooner rather than later.

Cybersecurity professionals: Five ways to increase the talent pool

Cybersecurity professionals: Five ways to increase the talent pool

The lack of cybersecurity skills in the industry is glaring, but there are ways for educators, vendors and enterprises to fix the problem. Sean Martin explains how.

Inside the Minds of Bug Bounty Researchers

Inside the Minds of Bug Bounty Researchers

An intimate look at what makes a bug bounty run – payouts, notoriety, good will? Sean Martin investigates in this IT Security Planet exclusive.

Salesforce Makes a Play for Security

Salesforce Makes a Play for Security

CRM giant helps admins and the businesses they support get an upper-hand on protecting data. Sean Martin explores the topic in this article on IT Security Planet.

Obtaining Context from Security Events

Obtaining Context from Security Events

To properly identify and manage security incidents, organizations need to collect data in real time, analyze the data in real time, and store that data...