Please turn on your JavaScript for this page to function normally.
New UK law says GCHQ agents cannot be prosecuted for hacking

In a job posting published last week, the Government Communications Headquarters (GCHQ) – the UK version of US’ National Security Agency – openly announced …

The cybersecurity domino effect

RedSeal unveiled its survey of high-ranking executives that illustrates widespread concern regarding the potential effects of cyberattacks in corporate America.Most of the …

The importance of good threat intelligence

The cyber-threats our organizations face are continuing to evolve, partly in respect to the broadening motivations behind attacks, and partly due to the increased …

Secure smart devices for the holiday season

Summer is almost here and many are currently considering taking their beloved smart devices with them on their travels. However, the risks of doing so are sizeable.With a …

There’s no security without trust

Trust. It’s a small word but it conveys a lot. To many it is the cornerstone of security, because without trust there can be no security. To operate securely in the online …

Week in review: VENOM bug, infosec and ethics, and flawed crypto endangers smart grid devices

Here’s an overview of some of last week’s most interesting news, podcasts and articles:IoT and the great data heistWith the introduction of new mobile devices in …

ISSA-LA to hold premier Los Angeles information security event

The Seventh Annual Information Security Summit offers educational sessions presented by a world-class line up of keynote and featured presenters.This year’s Summit and …

Combating insider threats in the contact center

Advances in security technology are making many payment channels safer than ever for consumers, however, they are also forcing professional fraudsters to concentrate on an …

Practical applications of machine learning in cyber security

As more and more organizations are being targeted by cyber criminals, questions are being raised about their planning, preparedness, and investment into cyber security in …

Cloud security best practices during all phases of the infrastructure lifecycle

In the era of cloud technology, online attacks are becoming more sophisticated. The days of drive-by exploitation are passing us by, replaced by attackers who run continuous …

New domains revive old spam

The new generic top-level domain (gTLD) registration program, launched in January 2014 and intended for use by relevant communities and organizations, has proved irresistible …

Organizations lack control over mobile workspaces

More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …

Don't miss

Cybersecurity news