Please turn on your JavaScript for this page to function normally.
The current wave of data protection regulations and how it will affect the infosec industry

In 2016, the EU is set to review the next draft of The Network and Information Security (NIS) ‘cybersecurity’ directive which will bring new compliance requirements into …

Point of Sale malware gaining momentum as holiday shopping season approaches

Point of sale (POS) systems – what consumers often call the checkout system – are often the weak link in the chain and the choice of malware. They should be isolated …

Information security innovation and the fast-paced threat landscape

Gary Warner recently became the Chief Threat Scientist at PhishMe. In this interview he talks about how his past positions prepared him for this new job title, information …

Five hacks that will affect your life in 2016

Cyber attackers have an abundance of opportunities to steal or modify data and disrupt business services. And their playground grows bigger and more diverse every day as the …

The appliance straightjacket and its effect on security

We have a love/hate relationship with our IT appliances. These technology workhorses impress us with their modern, industrial designs, bright colors, and slick branding. When …

Why governments need to take the lead in cybersecurity

Time and time again we hear people lament about the impact cybercrime has on our businesses, our individual lives, the economy, and on society. Report after report show the …

Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare

When is an IP address not actually the person, country of origin or device you thought? From Klingons, to Harry Potter, to Xbox Halo’s Master Chief, the world has dreamt up …

Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare

When is an IP address not actually the person, country of origin or device you thought? From Klingons, to Harry Potter, to Xbox Halo’s Master Chief, the world has dreamt up …

The transformative technology security nightmare

They say that every silver lining comes with a cloud attached and that’s certainly true of today’s transformative technologies. CEOs and the board rightly see BYOD, Cloud and …

Four ways organizations can prevent PII from becoming black market public record

Personally Identifiable Information (PII) is worth 10 times more than credit card information on the black market, making it imperative to have strong policies and safeguards …

Understanding a new security market: User behavior analytics

We know that tracking enterprise log data to discover suspicious activity from hackers or malicious insider threats is not a new idea. Five to 10 years ago, we saw the SIEM …

Cyber operational readiness and a complex threat landscape

Mike Walls is the Managing Director, Security Operations and Analysis at EdgeWave. In this interview he discusses keeping pace with an increasingly complex threat landscape, …

Don't miss

Cybersecurity news