Please turn on your JavaScript for this page to function normally.
architecture
How enterprise IT security conversations have changed

Deutsche Telecom is one of the world’s largest telecom companies, and its corporate IT and cyber security arm T-Systems is one of the largest European IT services …

Employees working while on holiday open orgs to security risks

Many workers will feel the need to check-up on work emails while they are away from the office and enjoying a well-earned vacation. Unfortunately, by doing that, they can open …

connected house
90% of consumers think security should be built into smart devices

90% of consumers polled from Brazil, China, Germany, India, UK and US believe it is important that a connected device has security built into the product, digital platform …

toy
Think twice before buying a smart toy for your child

For a while now, security researchers have been warning about the security and privacy dangers of many popular “smart” toys. While consumer protection …

Book
Review: Advanced Persistent Security

About the authors Ira Winkler, CISSP is President of the Internet Security Advisors Group. He is considered one of the world’s most influential security professionals. Araceli …

Google game teaches kids about online safety

Talking to kids about online safety is a difficult undertaking for many adults, and making the lessons stick is even harder. To that end, Google has launched a new program …

thumb up
Why people are at the heart of your information security success

In this podcast, Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4, talks about the human side of security. Are humans the weakest link? Why do people fall for …

communication
What’s really stopping users from adopting secure communication tools?

“Users’ goal to communicate with others overrides everything else, including security,” a group of researchers has concluded after interviewing sixty individuals …

danger
A guide on how to prevent ransomware

Ransomware is fast becoming a major threat to computer systems in many organisations. It is an aggressive form of attack which criminals use to infect computers and block the …

road sign
Is remote access technology leaving you vulnerable?

Insider and third-party access are growing security threats facing organizations and enterprise IT systems, according to Bomgar. Proliferation of security issues Despite …

Businessman
Security awareness is good, but good security culture is better

As an efficient mechanism to influence employee behavior, security culture is one of the most important, yet most overlooked, aspects of organizational security. “A …

email
Majority of workers blindly open email attachments

The vast majority (82 percent) of users open email attachments if they appear to be from a known contact, despite the prevalence of well-known sophisticated social engineering …

Don't miss

Cybersecurity news