Please turn on your JavaScript for this page to function normally.
Facebook data mining tool uncovers your life

You know you shouldn’t post potentially damaging data on Facebook, but more often that not, your friends don’t think twice about it, and this can impact you even …

Innovation, big data and the future of information security

Dr. Herbert (Hugh) Thompson is Program Chair for RSA Conferences and a world-renowned expert on IT security. He has co-authored several books on the topic and has written more …

1Password 3.9.6: Manage passwords or die trying

While it is available for other platforms, 1Password is probably the most popular password manager for the Mac. It also integrates into your browser to make website logins …

Smart building security: Threats, tips and tricks

Martin Lee is the Technical Lead, Threat Intelligence at Cisco. In this interview he discusses the critical security threats to smart buildings, the features of a robust and …

Computation and Storage in the Cloud: Understanding the Trade-Offs

These days, especially in the IT world, most people are familiar with the concept of cloud computing and they take advantage of it for a variety of personal and business …

The erosion of privacy in the digital world

Yves Le Roux is the Technology Strategist at CA Technologies and Chair of ISACA’s Data Privacy Task Force. In this interview he discusses the evolution of the digital …

Exploring critical infrastructure security and government cyber security

Chris Folk is the Director of National Protection Portfolio, The MITRE Corporation. Folk oversees work program development and delivery to: the DHS National Protection and …

Key cloud computing trends and enterprise security

Dan C. Marinescu is the author of Cloud Computing: Theory and Practice. He was a Professor of Computer Science at Purdue University in West Lafayette, Indiana from 1984 till …

Security intelligence through configuration auditing

Modern systems have a multitude of configuration elements that, ideally, meet the IT business requirements of the organization. The danger of having poorly configured systems …

Cloud Computing: Theory and Practice

Once a buzzword, cloud computing is now a part of nearly every modern IT infrastructure. Despite a variety of privacy, security and compliance concerns, companies large and …

Network Intrusion Analysis

What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention …

Jon Callas on privacy in the modern age

In this interview, Jon Callas, co-founder of PGP and current CTO at Silent Circle, discusses the global erosion of privacy and the importance of confidentiality. He tackles …

Don't miss

Cybersecurity news