Please turn on your JavaScript for this page to function normally.
Businessman
Do you have what it takes to be an independent security consultant?

It doesn’t matter if you’re part of a big enterprise or a small company, you’ve probably wondered at least once what it would be like to work for yourself. Dreams …

binary
The inherent problems of the detection paradigm

An ongoing debate in the modern cybersecurity world is whether to detect or prevent cyberattacks. Although detection technologies are undoubtedly important tools in the …

Most users limit personal info on social media due to hacking fears

Only 10 percent of internet-using adults in America used at least one social networking site in 2005. More than a decade later that number has grown exponentially, with 84 …

Gold
The economics of hacking: Change your thinking

If you saw the film Wall Street, you undoubtedly recall the iconic character Gordon Gekko famously stating, “what’s worth doing is worth doing for money.” This perspective is …

LightCyber
Who’s next? Shift focus and detect network attackers

Who will be the victim of the next major breach? Nearly all enterprises and organizations are sitting ducks for a targeted network attack. Maybe it’s time to take some …

industry
The future of ICS security depends on OT-centric security solutions

New cybersecurity operational technologies are emerging to protect industrial control systems (ICS) against impending IT threats and attacks. ABI Research indicates that …

password unlock
How to automate a custom password dictionary for your pen test

When doing penetration testing, security professionals regularly have to deal with words that are specific to the task at hand, and many are not found in common wordlists. …

pyramid
Why a layered defense is your best protection against malware

As long as there is software there will be vulnerabilities and those vulnerabilities will be exploited. It’s a bold statement, and oddly enough technically incorrect. In …

facepalm
Solutions for the hijacked websites problem

According to a group of researchers from Google and University of California Berkeley, roughly 16,500 new sites get hijacked each week and start serving drive-by-malware or …

Keyboard
Spring network cleaning: Quick tips to reduce risk

Spring is here, which means many people will be cleaning their workspace and getting rid of the clutter on their desks. If you’re in charge of your organization’s security, we …

Globe
3 steps to embracing NIST 800 security controls

One proven path to improving any organization’s security posture is to embrace the National Institute of Standards and Technology’s risk management framework set forth in its …

gears
Software tools and services used to achieve ISO 27001

With high profile breaches becoming almost a daily occurrence in the media, many organizations are now turning to the ISO 27001 information security standard to help them stay …

Don't miss

Cybersecurity news