Tips to manage top IT trends
ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology …
SCADA and PLC vulnerabilities in correctional facilities
Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic …
A Bug Hunter’s Diary
For individuals who make a living developing and maintaining software systems, finding bugs in their own code is almost a daily ritual. Working on software developing projects …
Ways to avoid falling victim to scams
With the holiday season upon us, more companies are sending customers information about great deals for last-minute shopping. Unfortunately, among those exciting offers comes …
Mobile application security risks
Security experts have already agreed on the fact that the increased use of personal mobile devices and smartphones for work purposes is one of the biggest threat to the …
EFF helps travelers defend their data privacy
Anytime you travel internationally, you risk a broad, invasive search of your laptop, phone, and other digital devices – including the copying of your data and seizing …
First EU report on maritime cyber security
ENISA published the first EU report ever on cyber security challenges in the Maritime Sector. This principal analysis highlights essential key insights, as well as existing …
How to avoid malware hiding behind QR codes
As the use of QR codes becomes increasingly widespread, users should be aware that they are also becoming an easy way for malware peddlers to spread their malicious wares. …
The risks of online shopping
More people than ever are using their personally owned smartphones to send and receive e-mails, browse the Internet, shop online and visit social media sites – as well …
The challenges of setting up a security conference
In this podcast recorded at the SecurityByte conference held this year in Bangalore, India, the conference founder Nishchal Bhalla talks about his motivations for organizing …
A new perspective on the insider threat
When talking about the insider threat, the first that comes to mind to many (if not all) information security professionals is the threat posed by rogue insiders that …
The multiple dimensions of corporate espionage
You’ve spent months fixing the red items on an internal audit report and just passed a regulatory exam. You’ve performed a network vulnerability assessment and …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD