Please turn on your JavaScript for this page to function normally.
danger
Know your enemy: Defining the new taxonomy of malicious emails

Just as it is the default tool for most businesses, email’s capacity for rapid, mass communication has made it a favourite instrument of criminals. As a result, malicious …

Globe
Behavioural profiling: Spotting the signs of cyber attacks and misuse

Behavioural profiling is increasingly recognised as a new level of protection against cyber attacks and systems abuse, offering the potential to pick out new and unknown …

danger
An untold cost of ransomware: It will change how you operate

Ransomware is unfortunately an IT reality. With the complexity and frequency of attacks, there is a good chance you or someone you know has been impacted. Many victims …

People
Security and the human factor: Creating a positive user experience

Despite the myriad of security solutions deployed, breaches are still happening. Even with the most robust security solutions it seems that we’re failing with the …

building blocks
Will blockchain liability be similar to Bitcoin liability?

For many, Bitcoin is the de facto face of blockchain. The cryptocurrency Bitcoin has gained a sullied reputation for its nefarious use in criminal or black market …

architecture
Cloud-based single sign-on means access and security everywhere

The cloud is now the standard of corporate organizational life. It is a standard practice for nearly every sector of every industry. So, there must be solutions available to …

tools
Evolution of security operations from reactionary survival mode to forced sophistication

The most security-sensitive companies approach their job and their day with the default assumption that they have been hacked, and they set out to prove that important …

artificial intelligence
Of machines and men: AI and the future of cybersecurity

For many in the cybersecurity community, ‘Ghost in the Shell’, both in its source material and recent film adaptation, is an inventive representation of where the sector is …

building
Bracing for the Denial of Things

Turn out the lights in any major city in the developed world, and you know what? It’s not really all that dark. Unless you’ve managed to lock yourself in a broom closet (I …

hands
Why we should define our right to privacy now, before it’s too late

The debate has stirred up again. Talk of wiretapping and government spying has spurred another bout of privacy versus security. Internet of Things (IoT) devices have raised …

Qualys
Don’t forget to pack security for the journey to the cloud

When you move workloads to public cloud platforms, you offload many tasks on the cloud provider, but don’t fall for the misconception that you’re entirely off the hook with …

cyber
Like it or not, “cyber” is a shorthand for all things infosec

We have lost the cyber war. No, not that cyber war. Maybe war of words is a better way to put it. Whether we like it or not, cyber has become the default way for everyone else …

Don't miss

Cybersecurity news