Please turn on your JavaScript for this page to function normally.
Teaching children information security skills

In this interview, Julie Peeler, the Director of the (ISC)2 Foundation, discusses the biggest online threats to kids and provides tips on how to teach children to stay safe …

Tracking botnets using automatically generated domains

Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security. Modern botnets rely on domain-generation algorithms (DGAs) to build …

The Circle

The book talks about a near future where the most significant company in the world is The Circle. They don't deal in goods, but in what we all know is the real commodity of …

The future? Big data and intelligence driven security

As we produce and consume an increasing amount of digital data, even the casual user is becoming aware that the way we store and access this data will continue to shift and …

A primer on breaking game console security

Are you interested to learn about the delicate hacks and tricks that go on behind the curtains of the scene better known as the console hacking scene? In this podcast recorded …

Facebook data mining tool uncovers your life

You know you shouldn’t post potentially damaging data on Facebook, but more often that not, your friends don’t think twice about it, and this can impact you even …

Innovation, big data and the future of information security

Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences and a world-renowned expert on IT security. He has co-authored several books on the topic and has written more …

1Password 3.9.6: Manage passwords or die trying

While it is available for other platforms, 1Password is probably the most popular password manager for the Mac. It also integrates into your browser to make website logins …

Smart building security: Threats, tips and tricks

Martin Lee is the Technical Lead, Threat Intelligence at Cisco. In this interview he discusses the critical security threats to smart buildings, the features of a robust and …

Computation and Storage in the Cloud: Understanding the Trade-Offs

These days, especially in the IT world, most people are familiar with the concept of cloud computing and they take advantage of it for a variety of personal and business …

The erosion of privacy in the digital world

Yves Le Roux is the Technology Strategist at CA Technologies and Chair of ISACA’s Data Privacy Task Force. In this interview he discusses the evolution of the digital …

Exploring critical infrastructure security and government cyber security

Chris Folk is the Director of National Protection Portfolio, The MITRE Corporation. Folk oversees work program development and delivery to: the DHS National Protection and …

Don't miss

Cybersecurity news