Exploring the complexity of modern cyber attacks
James Holley is an Executive Director at Ernst & Young LLP. In this interview he discusses the complexity of modern cyber attacks, the challenges involved in maintaining …
Tips for handling your first security breach
When it comes to data breaches, the risk for organizations is higher than ever before – from the calculable costs of leaked data to the less tangible effects on the …
Effective incident response
Organizations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical – but among those needles are little threads of …
Cyber risks awaiting visitors and viewers of Sochi 2014 Olympics
The 2014 Winter Olympics are set to start on Friday in Sochi, a Russian city located on the shores of the Black Sea. There have been many controversies regarding this choice …
Five lessons we can learn from financial services and compliance
Banks and financial services organisations have been a prime target for hackers for a very long time, and as a result of this the industry has had to adhere to security …
A solution for fixing hijacked Chrome settings
Many users – if not all – have experienced downloading a free screensaver or game without looking at the small print and consequently getting their browser …
How a fake antivirus attack works
Earlier this month, Invincea researchers have warned about visitors of video-sharing website Dailymotion being targeted with malicious ads leading to bogus infection warnings …
Defending against drive-by downloads
In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …
Why governance and policy can strengthen compliance efforts
A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …
How to recover deleted or corrupted digital currency
The popularity of Bitcoin and other digital / cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of …
Smartphone spying: How can users protect themselves?
Smartphone users need to realise that their mobile phone is less of a phone and more of a mobile computer, in which applications can collect data from other applications …
Who should be responsible for protecting your online privacy?
Just in time for Data Privacy Day, Microsoft has released the results of a survey that shows the privacy attitudes of technology savvy individuals in the US and four European …
Featured news
Resources
Don't miss
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024