Low Tech Hacking: Street Smarts for Security Professionals
When talking about hacking, many of us primarily think about software vulnerabilities, exploits, malware and coding. But as social engineering began to grab headlines, the …
Tips to minimize the risk of identity fraud
Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud. Prevention 1. Keep personal data …
Six principles for effective cloud computing
The growing shift to cloud computing can deliver significant value—but most enterprises have little knowledge of the perils of transferring IT decision making away from …
ISO 27001 and BS 25999-2: Why is it better to implement them together?
Lots of companies implementing ISO 27001 struggle how to implement the requirements from Annex A.14 – Business continuity management. The problem is that ISO 27001 does …
What is ISO 27001?
Learn the basics of information security and how to use ISO 27001 as a framework for managing information security management system. For more information and training, check …
Why is residual risk so important?
The term “residual risk’ is mandatory in the risk management process according to ISO 27001, but is unfortunately very often used without appreciating the real …
ISO 27001 video tutorials
One of the biggest obstacles for companies starting to implement ISO 27001 is writing various documents required by this information security standard. Information Security …
Practical Malware Analysis
Malware. You know what it is. Perhaps you’ve even fought a malware infection or two. Wouldn’t it be nice if the good guys finally had one really complete guide to …
Microsoft Windows Operating System Essentials
Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System …
Making Embedded Systems
Embedded systems control many devices in common use today, from digital watches and iPods to traffic lights and the systems controlling nuclear power plants. Since …
Top reasons for IT layoffs in 2011
Based on the data obtained with the help of a data leakage control system, and an in-depth analysis of work time usage by staff, the specialists of Falcongaze analytical …
ISO 27001 benefits: How to obtain management support
As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring