Please turn on your JavaScript for this page to function normally.
users
Security skills gap? What security skills gap?

After the year we’ve had, it shouldn’t come as a surprise that cybersecurity skills are heavily in demand. Breaches, attacks and incidents have never been far from the …

Eyes
The anti social network

Let’s be honest. Our online world is judged on how others view us, or as the psychologist Caldini would put it social validation. Want to buy a product? Well how many people …

backdoor
ENISA says crypto backdoors are a bad idea

“History has shown that technology beats legislation, and criminals are best placed to capitalise on this opportunity,” the European Network and Information …

Users lock
Network security: A team sport for SMBs

The increased volume and frequency of cyberattacks has made information security an everyday issue of great importance, regardless of your geographical location, industry, …

Laptop
No more guilt about your lack of innovation in administrative IT

Helpdesks are mired in mundane tasks that are repeated every day – password resets, user account access and account creations, just to name a few. Manual tasks that really …

lock
Why attaching security to each piece of data is critical

Following in Edward Snowden’s footsteps, yet another NSA contractor has leaked highly classified trade secrets and government information. My question to you: Are we really …

Lock
How much is your privacy worth?

How much is your privacy worth? Take for example your bank account number, sort code, name, and address. Is it worth more than £25? Well I think that it is and as a result I …

New York State
Proposed cyber security requirements for New York State seem to be more of the same

This month, New York State Governor Andrew Cuomo announced proposed regulation that requires banks, insurance companies, and other financial services institutions regulated by …

Trust
Should you trust your security software?

The complaint that security is broken isn’t new and even industry insiders are joining the chorus. Companies spent an estimated $75 billion last year on security products and …

World target
Shadow Brokers, digital attacks, and the escalation of geopolitical conflict

Last week’s data dump by the Shadow Brokers has left many wondering how the US will respond. This is just the latest in a series of politically motivated data breaches often …

rope
The state of security? No one cares about a breach

In an election year, everyone asks the question about whether or not you are better off than you were four years ago. There are many ways to answer such a question, and …

bald eagle
Is the Cybersecurity Act of 2015 effective?

While many are decrying the newly signed Cybersecurity Act of 2015 for its privacy issues, DB Networks is taking the Act to task for an equally troublesome reason: It is based …

Don't miss

Cybersecurity news