Please turn on your JavaScript for this page to function normally.
Tips for evolving your office’s security culture

Changing a corporate security culture, or even just that of your own office or department, can sometimes seem impossible. In general, people don’t like change: they just …

The Release
Documentaries about an expert convicted of leaking classified information

Stephen Kim was a top level state department intelligence analyst. He went to prison under the Espionage Act. The Surrender The Surrender intimately documents Stephen Kim’s …

cloud binary
Video: Trust in the Cloud panel

Here is video recording of a “Trust in the Cloud” panel which was a part of the Rackspace::Solve NYC event held last Thursday. Rackspace Security leader David …

math
Imperfect algorithms threaten democracy

Do we want algorithms that we can’t understand or question to influence how we get to live our lives? Unfortunately, as Cathy O’Neil, well-known mathematician and …

Video: General Data Protection Regulation, Safe Harbor Agreement, Copyright reform and the Google case

After having been ruled invalid by the ECJ, the Safe Habor Agreement is now back in the spotlight as the Commission has finally issued a communication on the Trans-Atlantic …

Car hacking via compromised car diagnostic tools

Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …

Data privacy endangered by international trade agreements

You might or might not know that some countries – especially some European ones – have (or are working on) strong data protection laws.What most people don’t …

To what extent companies digitally track our daily lives?

Do you know how digitally collected information uncovers things about you which you would rather remained private? We’re already living in the age of Big Data, and are …

Video: Bruce Schneier talks to Edward Snowden

As part of a Harvard computer science symposium, Bruce Schneier had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography to …

A walk through Black Hat USA 2014

Here’s a walk through video of the Business Hall at Black Hat USA 2014. The video features: Qualys Firemon iBoss Crowdstrike Palo Alto Networks Shape Security Pwnie …

Infosecurity Europe 2014 showcase

Here’s a video overview of Infosecurity Europe 2014, that took place last week in London. For a roundup of news from the conference, including photo galleries, podcasts …

Panic! No malware required!

The landscape has shifted. Security is no longer something your organization can have complete control over. In this video, John Strand will demonstrate how most large …

Don't miss

Cybersecurity news