Please turn on your JavaScript for this page to function normally.
How to detect fraudulent activity in a cloud without invading users’ privacy

A group of researchers have found a clever way for cloud providers to detect fraudulent activities in their clouds without actually probing into the kind of activity a user …

Preparing for an information audit

A constant concern of many organizations is how to improve security or ensure that they meet audit needs. Though this is a top concern, they assume that any type of solution …

Leveraging network intelligence and deep packet inspection

Tomer Saban is the CEO of WireX Systems, a provider of network intelligence solutions. In this interview he talks about how deep packet inspection helps with identifying …

The context-aware security lifecycle and the cloud

Ofer Wolf is the CEO at Sentrix, a provider of cloud-based web security solutions. In this interview he talks about the challenges of delivering enterprise-grade security, …

ISO 27001: An overview of ISMS implementation process

Register for this webinar to learn: Family of ISO 27k standards – for what purpose should each standard be used 17 steps towards ISO 27001 certification Key benefits and …

Tips to avoid online scammers this holiday season

With Black Friday and Cyber Monday offers, often dramatically cutting prices for one day only, there will be many genuine deals to be had. The problem for many of us is how to …

Fighting malware, emerging threats and AI

Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the …

ENISA guidelines on cryptographic solutions

ENISA published two reports. “Algorithms, key size and parameters” is a reference document providing a set of guidelines to decision makers, in particular …

User behavior intelligence in the expanding supply chain

The Internet has dramatically increased the speed of commerce across the globe. Today, the interconnectedness of various businesses facilitates just-in-time manufacturing, …

ITIL and ISO 20000 problem management

Remember this situation? You’re running Windows. The blue screen forces you to reboot your PC. And then it happens again. Incident Management = reboot your PC. And your …

6 tips for protecting your Internet-connected devices

While Internet-connected devices are our window on the world, we don’t realize that for cybercriminals it could be their window into ours if we don’t secure our …

How the threat landscape is shaping the network security business

Pat Calhoun is the Senior Vice President & General Manager, Network Security, at McAfee. In this interview he talks about constructing the strategic direction for …

Don't miss

Cybersecurity news