Expert analysis
October Patch Tuesday: Changes, urgent updates and what’s coming next
The leaves aren’t the only things changing this October. Patch Tuesday is here and with it comes some interesting updates from big names in the software space. This month, …
Components of an effective vulnerability management process
Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data …
Google wants to revamp public Wi-Fi networks, but what about security?
William Shakespeare once wrote, “the eyes are the windows to your soul,” but if you ask savvy retailers, they might say it’s guest Wi-Fi. Why? New Wi-Fi systems allow them to …
No more guilt about your lack of innovation in administrative IT
Helpdesks are mired in mundane tasks that are repeated every day – password resets, user account access and account creations, just to name a few. Manual tasks that really …
Why attaching security to each piece of data is critical
Following in Edward Snowden’s footsteps, yet another NSA contractor has leaked highly classified trade secrets and government information. My question to you: Are we really …
How much is your privacy worth?
How much is your privacy worth? Take for example your bank account number, sort code, name, and address. Is it worth more than £25? Well I think that it is and as a result I …
Vendor Security Alliance questionnaire: Starting a security discussion with vendors
The interconnection between major organizations and their many service providers is providing a successful, and often ignored, path through which attackers are penetrating …
DMARC email security is now mandatory for the UK government, what can the enterprise learn?
It’s no secret by now that email has become the number one tool for cyber criminals and fraudsters. Earlier this year the FBI predicted that Business Email Compromise attacks …
Using Big Data for intelligent enterprise security
No industry remains untouched by the potential of Big Data – and the cybersecurity sector is certainly no exception. A recent MarketsandMarkets study predicted the …
Proposed cyber security requirements for New York State seem to be more of the same
This month, New York State Governor Andrew Cuomo announced proposed regulation that requires banks, insurance companies, and other financial services institutions regulated by …
Security startup confessions: Hiring and firing
My name is Kai Roer and I am a co-founder of a European security startup, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices …
Clear and present danger: Combating the email threat landscape
Like it or loathe it, email is here to stay. Despite the ubiquity of file sharing services like OneDrive and Google Docs, email remains a fast and convenient way for users to …
Featured news
Resources
Don't miss
- GitHub CISO on security strategy and collaborating with the open-source community
- Chainsaw: Open-source tool for hunting through Windows forensic artefacts
- Time for a change: Elevating developers’ security skills
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance