Enabling secure file sharing in the enterprise
As enterprise mobility meets collaboration, the workplace as we know it is transforming. Gone are the days when employees stopped working after leaving the office or …
Best practices for government agencies to secure IT infrastructure
Many government agencies, departments, subcontractors, service providers, and organizations that operate IT systems on behalf of the government must ensure protection of their …
Shaping mobile security
Most of us are familiar with the “triangle’ project management model, which highlights the constraints on delivering results in projects. The three corners of the …
Infosec industry: Time to put up or shut up
The information security industry is one of the most exciting industries to be involved in. It offers many opportunities to exercise one’s passion and curiosity about …
Tips for a safe holiday season
Cyber scrooges leverage all types of digital devices, social media platforms and mobile apps to take advantage of consumers’ distraction during this festive and busy …
How cybercriminals scam consumers during the holiday season
McAfee announced its annual “12 Scams of the Holidays” list, which includes the most popular ways cybercriminals scam consumers during the holiday season as they …
8 criteria to decide which ISO 27001 policies and procedures to write
If you’re just starting to implement ISO 27001 in your company, you’re probably in a dilemma as to how many documents you need to have, and whether to write …
A holistic approach to protecting intellectual property
Protecting intellectual property (IP) is high priority for security professionals, but IP can be a vague term. What exactly is included under the umbrella of IP? And …
Overcoming Big Data security obstacles
When it comes to security, Big Data can be the cause of many obstacles. As Big Data often contains enormous quantities of personally identifiable information, privacy becomes …
Enterprises must prepare for attacks on supply chain and POS in 2015
One thing is certain – there is plenty of job security in the business of protecting data. Attackers keep upping their game therefore, so must we. 2014 can be …
EFF: Use VPN to avoid Verizon’s tracking header
If you are a Verizon mobile customer, here is another reason to start using VPN or Tor: to protect your online movements from being tracked by website owners and third-party …
Three branches of security: Strengthening your posture with checks and balances
With Election Day around the corner, we thought it an appropriate time to take a look at the checks and balances model that has served the United States well for over two …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards