Terena Bell

Terena Bell is a freelance journalist covering chatbots, natural language processing, and other AI. Follow her on Twitter @TerenaBell or learn more at terenabell.com.

Does Facebook even need a CSO?

The chatbot revolution will (not) be secure

The chatbot revolution will (not) be secure

Two blockchain projects hope to prevent bot authentication issues before they start.

5 tips to thwart medical device attacks

5 tips to thwart medical device attacks

Medical devices can be an easy gateway for hackers to steal valuable information. This advice will lower the risk of that happening.

How Facebook protects data with physical security

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection...

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

Sure, you’ve prepared for attacks and breaches, but how well can core business processes function when a crisis hits?

Branding infosec: Why security should consider its own internal advertising campaign

Branding infosec: Why security should consider its own internal advertising campaign

A positivity campaign raised security awareness — and improved performance — at Finning International.

How lean development improved software security at Fannie Mae

How lean development improved software security at Fannie Mae

Continual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.

5 myths of API security

5 myths of API security

In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces.

Third-party security vetting: Do it before you sign a contract

Third-party security vetting: Do it before you sign a contract

Security needs to ensure that all vendors and partners, even those not controlled by IT, meet the organization's security standards.

Will the end of net neutrality be a security nightmare?

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

Security platform or best of breed? There’s only one answer

Security platform or best of breed? There’s only one answer

How limited resources and the software as a service (SaaS) sales culture force security professionals into a best of breed strategy for infrastructure.

Load More