Please turn on your JavaScript for this page to function normally.
How big data is transforming information security

In this video recorded at Hack In The Box 2013 Amsterdam, Eddie Schwartz, CSO at RSA, The Security Division of EMC, discusses the impact of big data on information security. …

DDoS attacks: What they are and how to protect yourself

Ameen Pishdadi is the CTO at GigeNET. In this interview he discusses the various types of DDoS attacks, tells us who is at risk, tackles information gathering during attacks, …

Recommendations for securing Active Directory

Active Directory plays a critical role in the IT infrastructure, and ensures the harmony and security of different network resources in a global, interconnected environment. …

BYOD: The why and the how

Brad Keller and Robin Slade are Senior Vice Presidents at The Santa Fe Group. In this interview they talk in detail about the challenges involved in evaluating, deploying and …

(IN)SECURE Magazine issue 38 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 38 has been released today. Table of contents: …

How to detect hidden administrator apps on Android

Following the discovery of a new Android Trojan that uses several errors and vulnerabilities in the Android OS to make analysis harder for researchers and to remain hidden …

Information security executives need to be strategic thinkers

George Baker is the Director of Information Security at Exostar. In this interview he talks about the challenges in working in a dynamic threat landscape, offers tips for …

OWASP top 10 web application risks for 2013

Since 2003, application security researchers and experts from all over the world at the Open Web Application Security Project (OWASP) have carefully monitored the state of web …

Brown University CISO on education, BYOD and emerging threats

David Sherry is the CISO at Brown University. He leads the Information Security Group, charged with the development and maintenance of Brown’s information security …

Becoming a computer forensic examiner

Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order …

ISACA releases guide for performing business-relevant assessments

Establishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is …

DNS anomaly detection: Defend against sophisticated malware

Not so long ago, the standard way of looking for a malware infection was to simply monitor web traffic. By looking, for example, for HTTP requests to google.com/webhp – …

Don't miss

Cybersecurity news