Lucrative business: cybercrime-as-a-service
With news of the struggling high street becoming a regular occurrence, it is not surprising that increasingly small businesses are seeking opportunities online. However …
Securing the modern web: Open sourcing the future of IAM
Every CIO needs a reliable identity and access management (IAM) system for protecting employee, customer, and partner data – and for years, they have relied on …
Hacking a smart lightbulb system
The phenomenon of the Internet of Things (IoT) is positively influencing our lives by augmenting our spaces with intelligent and connected devices. Examples of these devices …
Exploring critical infrastructure security and government cyber security
Chris Folk is the Director of National Protection Portfolio, The MITRE Corporation. Folk oversees work program development and delivery to: the DHS National Protection and …
Key cloud computing trends and enterprise security
Dan C. Marinescu is the author of Cloud Computing: Theory and Practice. He was a Professor of Computer Science at Purdue University in West Lafayette, Indiana from 1984 till …
Security intelligence through configuration auditing
Modern systems have a multitude of configuration elements that, ideally, meet the IT business requirements of the organization. The danger of having poorly configured systems …
Defending against the BREACH attack
When Juliano and Thai disclosed the CRIME attack last year, it was clear that the same attack technique could be applied to any other compressed data, and compressed response …
Working as an ethical hacker
The term “ethical hacker” as it is used today is, if you ask me, somewhat imprecise. After all, a hacker in it for the money could be said to follow his or her own …
How to avoid digital dangers while traveling
It’s summer holiday season, when people pack up their smartphones and tablets, sunscreen and tank tops and set off for a change of pace. With connected devices …
Real-time data analysis increases DDoS defenses
Real-time analytics are a powerful tool for identifying denial of service attacks and other cyber threats, risks and events. Prolexic recommends that the information gleaned …
Keep your laptop safe while using Wi-Fi hotspots
The relaxing atmosphere of surfing at the beach makes it easy to forget about the sharks. Connecting to an unsecured network poses serious risks to your laptop and data. In a …
How to spot and avoid SMS scams
2013 has been touted by Gartner as the year when mobile phones will overtake PCs as the most common Web access device worldwide. When you think about it, it’s logical, …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics