Please turn on your JavaScript for this page to function normally.
Most of the top 100 paid Android and iOS apps have been hacked

97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies. In addition to an increase in app hacks …

How to become an ISO 27001 / ISO 22301 consultant

If you are thinking about a career change, becoming an independent consultant for ISO 27001 and/or ISO 22301 certainly sounds like an attractive option. But what do you need …

Week in review: Obama backs net neutrality, Darkhotel espionage, working at Pwnie Express

Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Darkhotel espionage campaign targets corporate executives …

Toshiba and Cisco to collaborate on new ways to utilize IoT

Toshiba and Cisco are collaborating on new ways to utilize the Internet of Everything that can dramatically improve processes, productivity and experiences in manufacturing, …

Enabling secure file sharing in the enterprise

As enterprise mobility meets collaboration, the workplace as we know it is transforming. Gone are the days when employees stopped working after leaving the office or …

Secure remote file access challenges

While the majority of full-time employees access files remotely (89%), nearly three-quarters (73%) still do so via email, and less than a quarter (22%) are aware of a …

Best practices for government agencies to secure IT infrastructure

Many government agencies, departments, subcontractors, service providers, and organizations that operate IT systems on behalf of the government must ensure protection of their …

Microsoft open sources .NET server stack

Microsoft open sourced the full server-side .NET stack and expanded .NET to run on the Linux and Mac OS platforms. The company also released Visual Studio Community 2013, a …

The most unpopular person in the room

That’s me. At least I was the week I wrote this. I had the wonderful opportunity to speak at a number of conferences that were not solely related to security. It was …

The biggest challenges around connected devices

Few European IT departments or workplaces are ready for the invasion of wearable technology and other connected devices. According to a 110-country survey of ISACA members who …

Shaping mobile security

Most of us are familiar with the “triangle’ project management model, which highlights the constraints on delivering results in projects. The three corners of the …

Report: Targeted digital threats against civil society organizations

Civil society organizations (CSOs) that work to protect human rights and civil liberties around the world are being bombarded with the same persistent and disruptive targeted …

Don't miss

Cybersecurity news