Please turn on your JavaScript for this page to function normally.
fire
Cut the FUD: Why Fear, Uncertainty and Doubt is harming the security industry

Although the acronym is close to a century old, FUD (Fear, Uncertainty and Doubt) has come to be closely associated with the technology industry since the 1970s. FUD is a …

danger
A look at the top seven ransomware attacks in the past decade

In part one of this series, we discussed exactly what ransomware is, including the effects of and motives behind different types of attacks. In this second article, I’ll look …

icosahedral
Not everything is sophisticated, let’s keep it simple

I don’t have dandruff. But if I did, then I could use a new sophisticated formula to cure my condition. Whether the problem is dandruff or a malware-related threat, the term …

plan
Three keys to making technical debt manageable

Remember back to a time when you worked on a project in college or grade school. You’re pushing through the project, and there is one piece that’s completed, but you know if …

question
Six data security questions that every board needs to ask

As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to …

Black Friday
Black Friday: When is a deal too good to be true?

Black Friday, the American sales phenomenon that allegedly marked the time of year when retailers began to make a profit – moving from the ‘red’ to the ‘black’ – has …

cloud storage
5 cloud storage predictions for 2018

At this point, the cloud is old news. This does not, however, diminish its continuing impact on individuals and businesses worldwide. As cloud-based services strive towards …

Hand
Why hackers reuse malware

Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …

Pyeongchang 2018
South Korea Winter Olympics: Cyber lessons from the past

There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin …

Android smartphone
Safeguard mobile devices: VPNs and personal firewalls are vital

As mobile devices have permeated every aspect of private and professional lives, users have become increasingly dependent on connecting to public hotspots – especially when …

building
For strong unified communications security, behavioral analytics is critical

If there’s one thing security professionals should understand and acknowledge – whether they’re part of an organization’s multi-person IT security team or the CISO guiding …

phishing
The long tail of phishing attacks

Targeted phishing has become the single most effective attack type in the world today. Phishing attacks have been the root cause of the majority of the large-scale data …

Don't miss

Cybersecurity news