Please turn on your JavaScript for this page to function normally.
Researchers prove HTML5 can be used to hide malware

“A group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow malicious actors to execute …

Unsharing in the sharing economy

It’s been a big year for the sharing economy. Numerous consumer services have skyrocketed to popularity by basing their business on the sharing of resources. Companies like …

The difficult task of meeting compliance needs

Compliance is a complex issue in many industries and organizations know all too well that there are major fines and potential punishments for not meeting the laws and …

3 ways to stop insider threats in your organization

No one wants their organization to be the next poster child for a major informational breach. No one wants their company to make headlines for having their data compromised or …

Identifying the five principal methods of network attacks

Companies are underestimating the risk of failing to provide security training to non-technical staff.A new Intel Security study, which surveyed IT decision makers in …

Why is ERP security so difficult?

ERP (Enterprise Resource Planning) security has been all over the news lately. From high profile breaches, like the recent U.S. Office of Personnel Management breach, to …

What a business leader should know about the cloud and its impact

Great companies see business risks as opportunities, and execute strategies accordingly. Such a mentality is compatible with emerging technologies. IT plays a vital role in …

Never underestimate the impact of a data breach

The growth of cyber-crime and the impact of successful attacks on an organization’s bottom-line should not be underestimated; it is anticipated that data breaches will …

We don’t know what we don’t know

Citing the latest cyber security statistics is a popular way for security companies to show that they are keeping a watchful eye on the threat landscape. Where does the …

The best way to prevent data breaches? It’s not what you think

Data security breaches seem to be popping up almost daily. From the 2015 IRS breach, to the hacking of federal government employees’ data by China, it’s clear much of our most …

You’ve been breached, now what?

Everybody tends to think that hackers will never ever target them or their company/organization until a breach occurs. This article concentrate on post-incident actions and …

Four essential tips that you can use to stay safe when you travel

Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your cyber …

Don't miss

Cybersecurity news