Key security program and budget data for CISOs
Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …
ENISA issues report on how to act after power cuts
EU cyber security Agency ENISA has issued a new report studying network outages caused by power cuts in detail, resulting in key findings and recommendations to the electronic …
Investigating Internet Crimes
Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through …
Top priorities for organisations to counter digital criminality
Martin Sutherland, Managing Director, BAE Systems Detica highlights that the single biggest issue that will hit organisations in 2014 will be the rise of digital criminality …
Microsoft releases BYOD best practices for enterprise workers
Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …
The growing hacking threat to e-commerce websites, part 2
In the first part of my article, I briefly revised attackers’ motivations to compromise your website. In this part, I will discuss how websites get hacked, how you can …
Four reasons why audits matter
We live in a world where assurance is a precious commodity. People with bad intentions are getting smarter every day as evidenced by the recent compromise of nearly 40 million …
What are the building blocks of security culture?
In order to understand how to create security culture, it is important to know what it is and how we define it, so that we can look beyond the basics. Taking into …
Five resolutions to help IT pros get ready for 2014
IT and cybersecurity professionals should resolve now to gear up for accelerated change and complexity in 2014, especially in cybersecurity, data privacy and big data, says …
Teaching children information security skills
In this interview, Julie Peeler, the Director of the (ISC)2 Foundation, discusses the biggest online threats to kids and provides tips on how to teach children to stay safe …
The growing hacking threat to e-commerce websites, part 1
Recently, a friend of mine, owner of a small online web store, had his website compromised. He asked me lots of questions about why this had happen (he didn’t really …
Building an OATH-compliant authentication server for less than $100
Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics