Please turn on your JavaScript for this page to function normally.
Cost of breach vs. cost of deployment

In security terms, 2014 read like a who’s who of data breaches. Huge, global companies like Target, eBay and Coca-Cola have succumbed to data loss. Public services like …

Protecting personal data in the consumer product industry

Eight in 10 consumers (80 percent) say they are more likely to buy from consumer products (CP) companies that they believe protect their personal information, yet only 37 …

Don’t look back in anger

At the end of the 2014, as at the end of many years before it, our mailboxes were filled with various vendors’ security predictions for 2015. We saw them also in …

Identity management trends in 2015

A new year is always an excellent time to look ahead. So, there’s not much of a better time than now to look at some of the identity management trends expected for the …

Corel DLL hijacking vulnerability could allow arbitrary command execution

Corel has developed a wide range of products including graphics, photo, video and office software. When a file associated with the Corel software is opened, the directory of …

Do we need regular IT security fire drills?

IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …

Is IT security stifling innovation and collaboration?

Critical company data is at risk in the UK as a result of organizations focusing their IT security policies and resources more on external threats, such as cybercriminals and …

The ubiquitous social media “buy’ button and the journey of authentication

Earlier this year two of the world’s largest social media sites, Facebook and Twitter, announced the addition of “buy’ buttons to their offerings, giving …

Week in review: Bitstamp hack, dangerous code in free apps, insider threats

Week in review: Bitstamp hack, and global defense-in-depth architectures analyzed Here’s an overview of some of last week’s most interesting news, reviews and …

Security of data in the cloud now an executive-level concern

The Cloud Security Alliance (CSA) surveyed more than 200 IT and security professionals, and nearly 72 percent admitted that they did not know the number of shadow IT apps …

Analysis of global defense-in-depth architectures

Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. That’s the stark conclusion of …

Innovation must not come at the price of security

One of the main themes to come out of CES has been the advancement of the Connected Human. Whilst we can’t commute to work on a Hoverboard just yet, “Sent From My …

Don't miss

Cybersecurity news