Raj Samani
My data, my problem
I haven’t seen BlackHat, you know the movie featuring Chris Hemsworth? In fact the list of shows or movies I haven’t seen (or in fact am unlikely to see) is growing as the …
Law enforcement and IT security companies join forces to fight ransomware
Today, the Dutch National Police, Europol, Intel Security and Kaspersky Lab launched the No More Ransom initiative, a new step in the cooperation between law enforcement and …
Worldwide IoT security spending on the rise
Worldwide spending on Internet of Things security will reach $348 million in 2016, a 23.7 percent increase from 2015 spending of $281.5 million, according to Gartner. …
Trust is the key to cloud adoption
Intel Security released a global report advocating the need for technology vendors to help businesses, governments and consumers understand the implications surrounding …
RSA Conference 2016: The infosec glass house?
A couple of years late to the party, but I finally made it to San Francisco with a real sense of excitement to attend what was described to me as the “Super Bowl of the …
Surprise? Most organizations are not cyber resilient
71 percent of UK organisations would rate their cyber resilience as low today, underlining a lack of preparedness to handle cyberattacks by the majority of UK organisations, …
Blockchain transactions create risks for financial services
Trust is the most valuable commodity in the digital age. Failure to trust the systems or organizations in which we place our digital assets leads us to look at alternate …
We’ve been hacked! Okay, I’ll deal with it next week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in …
Revisiting takedown wins: Are users in the developing world getting left behind?
We have all seen the headlines: another botnet dismantled, and we can all rest easy that the threat that has been plaguing us for all those years is now no longer an issue. …
IoT and the great data heist
The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …
I don’t need friends, I have followers
Admittedly, I didn’t really mean to utter those words but found them coming out of my mouth nonetheless. Well what else do you say when an eight year old ridicules you …
How cybercriminals hack our brains
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments