Combating attacks with collaborative threat intelligence
Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious …
Bruce Schneier on power and security
In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. …
Can you trust your online backup service?
While having lots of digital storage space at your physical location may be cheap nowadays, it’s also very useful to have offsite backups – not only in the event …
Creating a cloud security policy
Building a cloud security policy is a crucial step to take before diving into the cloud to ensure maximum benefits are achieved and data is secure. But some organizations, in …
How big data is transforming information security
In this video recorded at Hack In The Box 2013 Amsterdam, Eddie Schwartz, CSO at RSA, The Security Division of EMC, discusses the impact of big data on information security. …
DDoS attacks: What they are and how to protect yourself
Ameen Pishdadi is the CTO at GigeNET. In this interview he discusses the various types of DDoS attacks, tells us who is at risk, tackles information gathering during attacks, …
Recommendations for securing Active Directory
Active Directory plays a critical role in the IT infrastructure, and ensures the harmony and security of different network resources in a global, interconnected environment. …
BYOD: The why and the how
Brad Keller and Robin Slade are Senior Vice Presidents at The Santa Fe Group. In this interview they talk in detail about the challenges involved in evaluating, deploying and …
(IN)SECURE Magazine issue 38 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 38 has been released today. Table of contents: …
How to detect hidden administrator apps on Android
Following the discovery of a new Android Trojan that uses several errors and vulnerabilities in the Android OS to make analysis harder for researchers and to remain hidden …
Information security executives need to be strategic thinkers
George Baker is the Director of Information Security at Exostar. In this interview he talks about the challenges in working in a dynamic threat landscape, offers tips for …
OWASP top 10 web application risks for 2013
Since 2003, application security researchers and experts from all over the world at the Open Web Application Security Project (OWASP) have carefully monitored the state of web …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics