How to develop effective honeypots
Honeypots – decoy systems used for learning cyber attackers’ capabilities and potential objectives – can be very useful to organizations, businesses, and …
IT admin errors that lead to network downtime and data loss
Kroll Ontrack today released its most recent list of common IT administrator errors that can lead to data loss and network downtime. The findings indicate that the complexity …
Proactive FISMA compliance with continuous monitoring
After a great deal of debate and delay, the Federal Information Security Management Act (FISMA) finally saw a substantive update in December 2014. For federal agencies and the …
NIST updates ICS security guide
The National Institute of Standards and Technology (NIST) has issued the second revision to its Guide to Industrial Control Systems (ICS) Security. It includes new guidance on …
Online summer travel scams to watch out for
Iovation released a list of common online summer travel scams to watch out for. The company also announced that it has seen a hundred percent increase in online travel …
How to turn on two-factor authentication on over 100 popular online services
TeleSign launched Turn It On, a new campaign featuring a guide to two-factor authentication and providing step-by-step instructions for turning on 2FA for over a 100 popular …
Cloud SaaS data protection strategies
Handing control of sensitive data to a third-party cloud service provider remains one of the biggest data compliance challenges today. Top executives from Perspecsys are on …
Cookie warnings: Useless and bad for security?
Cookies are the official and standard and preferred way of keeping state in the (otherwise) stateless HTTP protocol. They are sometimes used for keeping track of a user beyond …
The challenges of data classification
We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. From information gateways, websites, …
Drone detection: What works and what doesn’t
Another drone was discovered flying in restricted air space around the White House two weeks ago. The Secret Service found the pilot simply because they happened to see him. …
Breach detection: Five fatal flaws and how to avoid them
When the Sarbanes-Oxley Act of 2002 was passed, it fell on corporate security teams to translate its requirements into technical controls. That threw the IT Security function …
How businesses can stem the flow of leaky data
The privacy and security of corporate data is at risk like never before. Not only are businesses faced with an ever-growing variety of security threats, from sophisticated, …
Featured news
Resources
Don't miss
- Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild
- Workplace stress in 2026 is still worse than before the pandemic
- NIST admits defeat on NVD backlog, will enrich only highest-risk CVEs going forward
- Anthropic releases Claude Opus 4.7 with automated cybersecurity safeguards
- Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug