Please turn on your JavaScript for this page to function normally.
Software security in a market for lemons

There is little doubt that it’s difficult to develop secure software. First, you need to be aware of the need for security, accepting it as an important element of …

Whitepaper: 10 Things Your Next Firewall Must Do

NOTE: This whitepaper is no longer available, thanks for your interest. Over time, the fundamental functions your firewall executed have been nullified by the very traffic …

Protecting your child’s digital identity

Each day, as infosec professionals, we dedicate ourselves to protecting our client’s most valuable assets. We spend countless hours focused on keeping data, intellectual …

Improving your readiness for OCR audits

In the wake of healthcare data breaches, OCR audits for HIPAA compliance have become more common – and the consequences have been more highly publicized. But many …

Best practices in knowledge-based authentication

Knowledge-based authentication (KBA) is a methodology gaining increasing recognition for providing the identity proofing part of user authentication. A group of senior IT pros …

The 2014 Firewall Buyers Guide

NOTE: This whitepaper is no longer available, thanks for your interest. Make an informed decision on the right firewall for your business with this guide from Palo Alto …

The dangers of Cyber Monday deals

Today is Cyber Monday, the day when shoppers concentrate on buying the tech they wanted to all year, for a fraction of the original price. In the wake of the …

If anything shouldn’t be taken for granted, it’s Information Security Management

It was one of our usual off-the-record discussions when I spoke with network admin and asked about the regular password change set up on the system. And, the answer included …

What to expect in the unpredictable world of IT security?

2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues …

How to evaluate national cyber security strategies

ENISA issued an Evaluation Framework on National Cyber Security Strategies (NCSS) addressed to policy experts and government officials who design, implement and evaluate an …

How to detect fraudulent activity in a cloud without invading users’ privacy

A group of researchers have found a clever way for cloud providers to detect fraudulent activities in their clouds without actually probing into the kind of activity a user …

Preparing for an information audit

A constant concern of many organizations is how to improve security or ensure that they meet audit needs. Though this is a top concern, they assume that any type of solution …

Don't miss

Cybersecurity news