Please turn on your JavaScript for this page to function normally.
Timing is an influential risk-factor for cyber attacks

There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults. According …

How important is penetration testing?

With cyber attacks becoming the norm, it is more important than ever before to undertake regular vulnerability scans and penetration testing to identify vulnerabilities and …

Understanding and defending against Denial of Service attacks

Denial of Service (DoS) attacks continue to be on the rise, which is no surprise given our ever-growing dependency on Web-based services, coupled with the fact that these …

Placing the Suspect Behind the Keyboard

There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic …

Fraud and identity theft camouflaged by DDoS attacks

Prolexic shared attack signatures and details that are helpful to detect and stop DDoS attacks from the Drive DDoS toolkit, an attack tool often used as a source of …

Five ways to get the most out of your sandbox

There’s been a lot of talk lately about the value of sandbox technology as part of a cybersecurity defense. While sandboxes are a valuable tool in the hands of a …

Smart building security: Threats, tips and tricks

Martin Lee is the Technical Lead, Threat Intelligence at Cisco. In this interview he discusses the critical security threats to smart buildings, the features of a robust and …

Computation and Storage in the Cloud: Understanding the Trade-Offs

These days, especially in the IT world, most people are familiar with the concept of cloud computing and they take advantage of it for a variety of personal and business …

How encryption and tokenization help with cloud services adoption

Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …

Simple Steps to Data Encryption

After last week's Practical Anonymity, here is another book by Peter Loshin that you might need in this new world of ours. It's a practical, hands-on guide about how to use …

Security tips for the connected family

With more than half of families purchasing electronics this back-to-school shopping season, students are using more technology than ever to make the grade. As summer comes to …

The erosion of privacy in the digital world

Yves Le Roux is the Technology Strategist at CA Technologies and Chair of ISACA’s Data Privacy Task Force. In this interview he discusses the evolution of the digital …

Don't miss

Cybersecurity news