Why wiping decommissioned IT assets should be a must
Last week I’ve written about the ways confidential data can leak outside the organization if the IT security team doesn’t pay attention to printers, shredders, or …
Do young people care about privacy?
Everywhere I go, I hear some variation of the claim that “young people today just don’t care about privacy.” This is something that people widely seem to …
How do you protect yourself in the event of a data breach?
Identity Guard warns consumers to be aware of the increased risk of identity theft and provides tips on how they can help protect themselves from becoming a victim. In a …
Is your company ready for a big data breach?
Despite the majority of companies experiencing or anticipating significant cost and business disruption due to a material data breach, they still struggle to take the proper …
Twitter’s recipe for security awareness
Security awareness training is an issue that has been and continues to be hotly debated both online and offline. It is also a topic that seems a little out of place at the …
You’ve been hacked, now what?
Given the increased frequency and complexity of cyber attacks on business networks of all sizes, the odds of experiencing a breach is almost guaranteed if the right security …
A call to arms for infosec professionals
An old saying says “nature abhors a vacuum,” meaning that in the absence of something nature will find a way of filling that gap. We are currently witnessing the …
10 best practices for securing data in Hadoop
Dataguise released ten security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and …
Tips for securely using free Tube Wi-Fi
GFI Software warned of potential data and device security concerns posed by using London’s public Wi-Fi service, installed across large parts of the London Underground …
My very own personal privacy training
I remember a time – and it wasn’t even that long ago – when the government, companies and organizations weren’t this hell-bent on collecting citizen, …
DIY: Using trust to secure embedded projects
This talk from Shmoocon 2013 provides a DIY guide to using Trusted Computing on embedded devices. The authors introduce a low-cost schematic using Atmel’s CryptoModule …
Tips for avoiding tax scams
As the April 15 deadline for tax filing draws near, the Center for Internet Security (CIS) helps users recognize tax-related scams and better defend against them. Findings …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints