Please turn on your JavaScript for this page to function normally.
Security tips to combat mobile device threats to healthcare

Mobile devices are increasingly exposing protected health information (PHI) in the healthcare space, with threat risks growing, according to the Department of Homeland …

ISO 22301: An overview of BCM implementation process

While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties – …

Password security, one step at a time

Last week we saw millions of passwords leak from LinkedIn, eHarmony and Last.fm. Much has been written over the last twenty years about how to create strong passwords, but no …

Implications of the rise of mobile devices

CIOs and IT leaders must address three key implications of the “post-PC” era, as workforces and consumers increasingly access IT applications and content through …

Five IT security threats and how to combat them

Faced with external security threats from hackers and others, along with a growing array of even more dangerous internal security threats, companies worldwide are feeling the …

Small businesses not afraid of data breaches

As the number of data breaches involving smaller businesses continues to grow, a new survey by The Hartford finds that 85 percent of small business owners believe a data …

Tips for safe password use

After the news about the theft of millions of user passwords from the business-based networking site LinkedIn, dating site eHarmony and Last.fm, users should be extra vigilant …

Make your pentester work harder for his money

In this video recorded at Infosecurity 2012, Wolfgang Kandek, CTO at Qualys, talks about their recent research dealing with Java. Many modern exploits use Java as a stepping …

Apple publishes iOS security guide

Apple has a reputation for being extremely reticent when it comes to discussing security in public – so much so that most of the security features their devices sport …

Passing the internal scan for PCI DSS 2.0

Merchants subject to Payment Card Industry Data Security Standard (PCI DSS) rules are often blindsided by DSS changes, arrival of new payment technologies, and newly emerging …

Gamers increasingly under attack

In this video, Christopher Boyd, Senior Threat Researcher at GFI Software, talks about how scammers increasingly target gamers and gaming databases because of valuable …

(IN)SECURE Magazine issue 34 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 34 has been released today. Table of contents: …

Don't miss

Cybersecurity news