Please turn on your JavaScript for this page to function normally.
Bitcoin
How to keep your cryptocoins safe?

Intrigued by the many possibilities of cryptocurrencies – not least by the prospect to “earn” serious money while doing nothing – you’ve decided …

abstract
New infosec products of the week​: September 29, 2017

Fortanix launches runtime encryption using Intel SGX Fortanix’ Self-Defending Key Management Service (SDKMS) is a cloud service delivering runtime encryption technology to …

cybersecurity
Activists targeted with barrage of creative phishing attempts

More often than not, the human element is the weakest link in the security chain. This fact is heavily exploited by cyber attackers, and makes phishing and spear-phishing …

users
Inadequate IT processes continue to create major security and compliance risks

The results of a study of more than 900 IT security professionals, conducted by Dimensional Research, spotlights how common security best practices – such as timely …

business
Company directors are increasingly involved with cybersecurity

According to a new survey by BDO USA, 79% of public company directors report that their board is more involved with cybersecurity than it was 12 months ago and 78% say they …

Apple Face ID
How Apple’s Face ID works, learns, and protects

Apple has unveiled a new version of its privacy page and a paper throwing more light on how Face ID, its newest biometric authentication option, works on iPhone X …

hunt
Laying the foundation for a proactive SOC

Most companies are trying to shift their Security Operations Center (SOC) from a reactive to a proactive posture. To do that, the analysts’ reaction to security events …

road sign
Is this the year SIEM goes over the cliff?

While this may not be the year that Security Information and Event Management (SIEM) solutions fall off of the cliff of relevancy into obsolete software land, they are slowly …

(IN)SECURE Magazine 55
(IN)SECURE Magazine issue 55 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 55 has been released today. Table of contents …

GDPR
Only 45% of organizations have a structured plan for GDPR compliance

The General Data Protection Regulation (GDPR) will go into effect in 2018, making organizations accountable for personal data protection including how and where data is stored …

Deloitte
After hack, security researchers probe Deloitte’s security posture

It’s difficult – if not impossible – for any organization to keep their networks and systems completely safe from knowledgeable, well-resourced and …

ATM
ATM hackers switch to network-based attacks

More and more attacks against ATMs are network-based, Trend Micro researchers have found. Since the discovery of the first ATM malware back in 2009, criminals have …

Don't miss

Cybersecurity news