Ransomware’s lucrative next stop? The Point of Sale
With the influx of credit card breaches over the past few years at major brands, hackers may have reached a point of supply exceeding demand, as awareness of breaches, …
The evil of vanity metrics
With the fast-paced evolution of tools and connectedness in business operations, the amount of network and log data has exploded. However, organizations have largely failed to …
Cut the FUD: Why Fear, Uncertainty and Doubt is harming the security industry
Although the acronym is close to a century old, FUD (Fear, Uncertainty and Doubt) has come to be closely associated with the technology industry since the 1970s. FUD is a …
Not everything is sophisticated, let’s keep it simple
I don’t have dandruff. But if I did, then I could use a new sophisticated formula to cure my condition. Whether the problem is dandruff or a malware-related threat, the term …
Three keys to making technical debt manageable
Remember back to a time when you worked on a project in college or grade school. You’re pushing through the project, and there is one piece that’s completed, but you know if …
Six data security questions that every board needs to ask
As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to …
5 cloud storage predictions for 2018
At this point, the cloud is old news. This does not, however, diminish its continuing impact on individuals and businesses worldwide. As cloud-based services strive towards …
Why hackers reuse malware
Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …
For strong unified communications security, behavioral analytics is critical
If there’s one thing security professionals should understand and acknowledge – whether they’re part of an organization’s multi-person IT security team or the CISO guiding …
The long tail of phishing attacks
Targeted phishing has become the single most effective attack type in the world today. Phishing attacks have been the root cause of the majority of the large-scale data …
Infosec expert viewpoint: IoT security initiatives
IoT went quickly from buzzword to mainstream, and connected devices have become common in households and enterprises around the globe. A worrying lack of regulation has fueled …
Infosec expert viewpoint: Vulnerability patching
Vulnerability patching is one of the most useful and cost-effective methods to mitigate a plethora of security threats. Here’s what infosec experts think about the …
Featured news
Resources
Don't miss
- North Korean IT workers are extorting employers, FBI warns
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)