Expert analysis
The eternal struggle: Security versus users
There’s an old joke that a job in security is a safe place to be grumpy. From what I’ve seen over my career, that is often true. Security people seem to cherish their …
April Patch Tuesday forecast: Expect updates for Adobe Flash, others
Springtime is here! Although up here in Minnesota you wouldn’t believe it as we received snowfalls that rivaled anything in the past 34 years! As spring arrives you think of …
Using biometrics to protect crypto currency
The rise of crypto currency is something that investors have monitored closely. Whether Bitcoin, Zcash or Ripple, the rise of this digital currency is here to stay. With this …
Are there too many cybersecurity companies?
The most potent global threat in 2018 may not be armed conflict or civil unrest, but cybersecurity. While cybersecurity awareness has increased with high profile breaches in …
The current state of USB data protection
Data protection, whether related to personal customer or patient information, is critical across virtually all industries. So how can organizations best protect their most …
Using deception to gain enterprise IoT attack visibility
The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and …
How Facebook’s data issue is a lesson for everyone
The headlines have been dominated by the recent news around Facebook, Cambridge Analytica and the misuse of customer data. The impact of these revelations has led to millions …
Why PKI will secure the Internet of Things for years to come
A long, long time ago, nearly 4,000 years, in a land far, far away ancient cryptography was born. The Place? Egypt. It is there historians believe the technique was invented …
The great attribution debate: Why we should focus on HOW not WHO
Organisations often don’t understand what they need to be protecting themselves from when it comes to costly cyber-attacks. The threat landscape is becoming ever-more …
Prevent bot traffic from ruining Google Analytics
Distil Bot Discovery for Google Analytics is a free offering that will give website owners the ability to understand the impact of bots on their business. The service is …
Four wireless standards hackers will target after Wi-Fi
When any new communication medium for sharing information emerges, it’s often quickly followed by those committed to hacking it. This natural progression is …
Web security and high availability for blockchain-based businesses and financial institutions from Incapsula
Blockchain and cryptocurrency news was all the rage last year and it looks like that trend will continue to rise in 2018. Blockchain technology is on its way to being adopted …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security