Please turn on your JavaScript for this page to function normally.
data
Metadata: The secret data trail

Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …

users
Security skills gap? What security skills gap?

After the year we’ve had, it shouldn’t come as a surprise that cybersecurity skills are heavily in demand. Breaches, attacks and incidents have never been far from the …

fence
Five ways to prevent data leaks

The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …

User
Six critical customer support differentiators in cybersecurity

Regardless of size or sector, excellent customer support is a major differentiator within any organization. In the cybersecurity industry, however, tech support is more than a …

Eyes
The anti social network

Let’s be honest. Our online world is judged on how others view us, or as the psychologist Caldini would put it social validation. Want to buy a product? Well how many people …

Microsoft
Will February’s Patch Tuesday fix a known zero-day?

Coming into Patch Tuesday we have a known zero day on the Microsoft side, and we’ve seen example code for an SMB exploit that could lead to DoS and BYOD of a system. US …

cables
It’s time to rethink using remote access VPNs for third-party access

No longer safely operating behind the traditional corporate perimeter, business productivity today depends on integrating external members of the extended enterprise into the …

car swerving hacking
Don’t take your hands off the wheel

Let me tell you a story. It’s a story about my brother-in-law, whom, for the sake of decency, we’ll call Steve. Steve has a new car. He loves that new car. It’s great. Does …

skull
Why companies shouldn’t feel helpless in the fight against ransomware

According to recent reports, ransomware is now a billion dollar business for cybercriminals. Attackers are honing in on the weak spots of organisations; human behaviour …

alert
Six best practices for managing cyber alerts

Security professionals know that the number of cyber alerts is growing at a frantic pace. Even a mid-sized company can face tens of thousands of alerts every month. As the …

shield
Is it time to call an MSSP? Five signs that it can’t wait

Small and midsize businesses (SMBs) are fighting an uphill battle when it comes to managing their network security. According to a 2016 Ponemon study, 69 percent of SMBs don’t …

danger
Analysis of new Shamoon infections

All of the initial analysis pointed to Shamoon emerging in the Middle East. This however was not the end of the story since the campaign continues to target organizations in …

Don't miss

Cybersecurity news