Infographic: 4 authentication definitions you should know
This infographic by Wave Systems addresses current authentication problems and illustrates how to ensure that only known users access corporate resources, devices and …
Identifying deceptive behavior in user-generated content
In this interview, JT Buser, Manager of Authenticity and Fraud at Bazaarvoice, talks about challenges involved in identifying deceptive behavior in user-generated content as …
Seven Destiny video game tactics that translate to cyber security
Why learn by grinding through dry security best practices when you can make education unique by mixing in a little geeky fun? In the third installment of my security pop …
Android browser SOP bypass bug: Who’s affected, and what to do?
A security researcher has recently discovered not just one but two vulnerabilities in the Android Open Source Project (AOSP) browser that could allow attackers to bypass the …
How can parents keep their children safe on the Internet?
In today’s society, children are unquestionably more tech-savvy than ever before, with far greater access to gadgets and a veritable wealth of information at their …
Modes of defense against security breaches in healthcare
It’s no secret that data security has serious implications for healthcare providers. A major breach can seriously undermine public trust – and result in hefty …
Password security is not just a user problem
When high profile password compromises occur, we often spend a lot of time focusing on advice to the users – “Use strong passwords;” “Don’t reuse …
Education is the key to increasing mobile security
The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …

Data Protection for Photographers
Today's high resolution digital cameras ensure that active photographers have to manage massive amounts of data. Keeping this data safe in the long run can present a …
We can fix security, but it’s not going to be easy
When I think about computer security, I like to go back to its early days and compare the situation then with the situation now. Taking a step back is very useful because, …
Top tips to protect systems against insider misuse
The 2014 Verizon Data Breach Investigations Report revealed a disturbing trend, which is the fact that users’ access rights have become a weak point in the security …
Behavioral analysis and information security
In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security, how behavioral analysis can …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards