Patching: The least understood line of defense
When it comes to security, only a total dope doesn’t understand firewalls, anti-virus and at least the basics of passwords. But how many end users, indeed how many IT …
5 things infosec can learn from adventure games
As an active adventure gamer and a natural seeker of reusable patterns, I’ve noticed that some of the things I do to achieve success in video games can be applied to …
10 most significant software security design flaws
The IEEE Center for Secure Design, a cybersecurity initiative focused on the identification of software design flaws, released a report based on real-world data collected and …
Why every security-conscious organization needs a honeypot
You’ve probably heard the phrase about “canaries in a coal mine.” In the mid 1900s, a guy named John Haldane figured out that birds die pretty quickly when …
Point of Sale system architecture and security
To most people, Point of Sale (POS) systems with integrated payment processing are a black box where magic happens. In this podcast recorded at Black Hat USA 2014, Lucas …
How important is website security?
In this interview, Nicholas Sciberras, Product Manager at Acunetix, illustrates why website security should be a priority in any organization. He talks about the challenges …
Securing the U.S. electrical grid
The Center for the Study of the Presidency & Congress (CSPC) launched a project to bring together representatives from the Executive Branch, Congress, and the private …
8 ways to talk security with executive management
The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive …
NIST vetting guide helps in testing mobile apps
While many mobile device apps such as a calendar or collaboration tools are very handy and can improve productivity, they can also introduce vulnerabilities that can put …
Mobile device security: Tackling the risks
Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a …
Infographic: How secure is Bitcoin?
The security of Bitcoin transactions is one of the main drawbacks of the digital currency. The infographic below takes a look at what you need to know to stay vigilant. Click …
BGP hijacking for cryptocurrency profit
In cryptocurrency, “mining” is the act of validating transactions listed in the public ledger (also known as the block chain). When a transaction is initiated, it …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?