Hacking Web Apps
Web security impacts applications, servers and browsers. Successful attacks against Web applications and sites means bad news for their owners, developers and users. This book …
What DDoS attacks reveal about your security infrastructure
As we close out 2012, there is no doubt that this year will go down as epic in the history books of information security professionals. Looking back on the year it’s not …
BYOD challenges for large organizations
Alexander Hav?¤ng is the CTO at Procera Networks and in this interview explains enterprise challenges with BYOD. BYOD is one of the biggest buzzwords in recent years. In …
Top 10 risks found by your auditor
KirkpatrickPrice offers a list of the most common risks they find. 1. No formal policies and procedures Formal guidelines of policies and procedures help provide your …
Phishing techniques, consequences and protection tips
In this interview, Rohyt Belani, CEO at PhishMe, illustrates the magnitude of the phishing threat. He discusses techniques, consequences and protection tips. What happens once …
Ten tips for mobile security
Mobile devices have become increasingly common and the markets are flooded with new applications for business and entertainment. People are using mobile devices to play games, …
Guidance on cybersecurity, private clouds and privacy
ISACA today issued guidance on managing three top trends posing major challenges to businesses in 2013: cybersecurity threats, private vs. public clouds and data privacy. …
Online reputation management tips
AVG announces twelve tips for individuals to safeguard their reputations while engaging in heightened e-commerce and social media activities during the holidays. …
Privacy protection tips
Every month more than 5,000 people take to Twitter to complain about how their mobile device has been snooped on or their visual privacy invaded. Who can’t resist …
Staying safe if your IT security budget gets cut
As companies continue to struggle in today’s difficult economy, cutbacks affect all sectors of organizations. Unfortunately, IT security solutions are often not spared …
Three major impacts when moving to a BYOD policy
Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …
Essential safe shopping tips
Based on Kaspersky Lab’s world-wide insight into malicious software and online scammers, the company offers the following 10 warnings and tips for online shoppers: …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence