Expert analysis

Why hackers reuse malware
Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …

South Korea Winter Olympics: Cyber lessons from the past
There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin …

Safeguard mobile devices: VPNs and personal firewalls are vital
As mobile devices have permeated every aspect of private and professional lives, users have become increasingly dependent on connecting to public hotspots – especially when …

For strong unified communications security, behavioral analytics is critical
If there’s one thing security professionals should understand and acknowledge – whether they’re part of an organization’s multi-person IT security team or the CISO guiding …

The long tail of phishing attacks
Targeted phishing has become the single most effective attack type in the world today. Phishing attacks have been the root cause of the majority of the large-scale data …

Rise and evolution of ransomware attacks
Ransomware, malware that encrypts systems and then asks for a ransom to decrypt files and systems, has become more prevalent in recent years. In fact, two of 2017’s major …

Risk assessment: The first step in improving cyber security
Despite the proliferation of high profile cyber-attacks over the last 18 months, many organisations are still too disorganised in their approach to security. While it is no …

November Patch Tuesday forecast: .NET, Adobe, Firefox and more
Fall is upon us and the holidays are right around the corner! But before we continue shopping, we need to cover a few security topics for this month. KRACK vulnerability The …

Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies
Today, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization appears to be safe, and it has …

Is trading resilience for business growth a smart strategy?
Not long ago, the probability of a threat materializing was enough to open the IT pocketbook. Today, the mentality has shifted from one of risk prevention to one of risk …

Modernizing cybersecurity training for the next generation
Equifax, Verizon, Molina Healthcare, Deloitte, Whole Foods, Wendy’s… it seems like every time we turn on the television another high-profile data breach is being …

The mobile workforce: Productive, but susceptible to data compromise
An enterprise’s biggest problem when it comes to data compromise isn’t just technologies that are vulnerable, it’s how their employees use technology. Digital transformation, …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)