Please turn on your JavaScript for this page to function normally.
There’s no security without trust

Trust. It’s a small word but it conveys a lot. To many it is the cornerstone of security, because without trust there can be no security. To operate securely in the online …

Week in review: VENOM bug, infosec and ethics, and flawed crypto endangers smart grid devices

Here’s an overview of some of last week’s most interesting news, podcasts and articles:IoT and the great data heistWith the introduction of new mobile devices in …

ISSA-LA to hold premier Los Angeles information security event

The Seventh Annual Information Security Summit offers educational sessions presented by a world-class line up of keynote and featured presenters.This year’s Summit and …

Combating insider threats in the contact center

Advances in security technology are making many payment channels safer than ever for consumers, however, they are also forcing professional fraudsters to concentrate on an …

Practical applications of machine learning in cyber security

As more and more organizations are being targeted by cyber criminals, questions are being raised about their planning, preparedness, and investment into cyber security in …

Cloud security best practices during all phases of the infrastructure lifecycle

In the era of cloud technology, online attacks are becoming more sophisticated. The days of drive-by exploitation are passing us by, replaced by attackers who run continuous …

New domains revive old spam

The new generic top-level domain (gTLD) registration program, launched in January 2014 and intended for use by relevant communities and organizations, has proved irresistible …

Organizations lack control over mobile workspaces

More than 64 percent of respondents to a SANS survey said a majority of their mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent …

The slow death of static security detections: Beginning of SIEM deployments

Machines both mechanical and electric have always been good at counting things. Ask anyone from an earlier generation who still uses a Victor Champion adding machine from the …

Can you correctly identify phishing emails?

An Intel Security quiz presented ten emails and asked respondents to identify which of the emails were phishing attempts designed to steal personal information and which were …

CIOs are distracted by the business of keeping the lights on

75 percent of CIO respondents to a global survey stated their network is an issue in achieving their organizations goals. For almost a quarter of CIO’s polled, it is a …

Man charged with attempted spear-phishing attack on U.S. Department of Energy

An indictment is charging a former employee of the U.S. Department of Energy and the U.S. Nuclear Regulatory Commission (NRC) with a total of four felony offenses in …

Don't miss

Cybersecurity news