Please turn on your JavaScript for this page to function normally.
Free ebook identifies easy to manage network security vulnerabilities

nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …

Video: Why privacy matters

Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …

PCI Council adds guidelines for data security risk assessment

The PCI Security Standards Council (PCI SSC) released the PCI DSS Risk Assessment Guidelines Information Supplement, a product of the PCI Risk Assessment Special Interest …

Tips for staying safe this Cyber Monday

Cyber Monday, one of the largest online shopping days of the entire year, is coming November 26. The National Retail Federation estimates that shoppers spent more than $1.2 …

12 scams of Christmas

A Harris Interactive study, conducted online among over 2,300 U.S. adults, investigates the online habits and behaviors of Americans, including those who indicate that they …

Can you trust the cloud?

Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that cloud security issues (84.4%) and cloud privacy and compliance issues …

How to stay secure in a changing world

In Sir Isaac Newton’s time there were three laws of motion, which dominated the scientific view of the world. While he, and his scientific peers, might have had many …

Best practices from healthcare and compliance experts

Data breaches in healthcare are raising alarm. Nearly 20 million patient health records have been compromised in the past two years, according to the U.S. Department of Health …

Top five tips for network protection

This year has seen a continued rise in targeted attacks and insider threats designed to steal confidential data. Nowadays, any organization that houses valuable intellectual …

Tips for protecting your privacy

Every month more than 5,000 people take to Twitter to complain about how their mobile device has been snooped on or their visual privacy invaded. Who can’t resist …

How to get promoted in IT security

Not only has landing a job become more difficult; it’s also getting harder to get promoted once you have the job. Here are some tips to getting ahead in today’s …

5 tips for effective disaster recovery

David Mount, technical director at NetIQ, has highlighted 5 tips that will help businesses implement effective disaster recovery plans for their all important IT assets. Am I …

Don't miss

Cybersecurity news