Tips to minimize the risk and impact of identity fraud
Last week, a Javelin Strategy & Research report found 12.6 million victims of identity fraud in the United States in the past year, which equates to 1 victim every 3 …
Tips to overcome PHI security obstacles
Healthcare organizations’ privacy programs are still understaffed and underfunded, even while millions of patients’ protected health information (PHI) are …
SmishGuru simulated attack service launches
Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing …
Security pros should listen with their heads, not their hearts
There is a phrase that has become quite popular in information security circles and it goes along the lines of “there are two types of organizations, those that have …
How to successfully submit conference talks
There are many ways a security professional can increase his public profile, and one of these is speaking at a conference. However, getting your work accepted at an event is …
Unintended, malicious and evil applications of augmented reality
Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …
Social engineering: Clear and present danger
Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …
Cybersecurity concerns of online dating
ThreatMetrix announced several ways for consumers to stay protected from online dating fraud and malware as Valentine’s Day approaches. According to Fast Company, online …
Identity theft protection tips
More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which …
Five safety tips for Valentine’s Day
Whether you decide to give flowers, chocolates or something a little more unusual as the perfect symbol of your affection this Valentine’s Day, make sure you take extra …
PCI DSS cloud computing guidelines
The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …
Learn by doing: Phishing and other online tests
As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices