How to protect from threats against USB enabled devices
Reports have been circulating that e-cigarette chargers from China were corrupted and infected machines with malware. Many journalists took the story at face value, even …
Guidelines on the auditing framework for Trust Service Providers
A new ENISA report provides guidelines on the auditing framework for Trust Service Providers (TSPs). These guidelines can be used by TSPs (preparing for audits) and Conformity …
Look where you’re going before backing up
For all intents and purposes, the 31st of March is not a day that infers significance. It is the 90th day in the Gregorian calendar (leap years aside), and is the home for …
10 practical security tips for DevOps
More organizations are embracing DevOps and automation to realize compelling business benefits, such as more frequent feature releases, increased application stability, and …
Crowdsourcing your bug bounty program
In this interview, David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way. …
The multiple benefits of IT auditing
Regulatory compliance requirements provide instructions for organizations on how to protect the data of their employees, business operations, and customers that are stored on …
Banks and IT security: The elements of success
In this interview, Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank, …
Implementing an effective risk management framework
In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new …
Four advantages of an identity behavior-based approach to cybersecurity
With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 …
Most parents don’t know how to tackle cyber bullying
54 percent of UK parents would have no idea if their child was being cyber bullied, highlighting that most parents are completely ill-equipped and under-educated in knowing …
Protecting the critical infrastructure: Strategies, challenges and regulation
In this interview, Raj Samani, VP and CTO EMEA at Intel Security, talks about successful information security strategies aimed at the critical infrastructure, government …
Trumping cybercriminals during tax season: Tips on how to stay safe
Tax season is stressful for many reasons and April 15 equals a headache for many Americans. In addition to wading through taxes, tax season also opens up a new vector in which …