Please turn on your JavaScript for this page to function normally.
Relying on your insurer for security? Think again!

Data breaches are a regular occurrence, one need simply look at the papers to read about the myriad of breaches that have occurred over the last year. From the Sony attack in …

Why break in, if you can simply login?

I was asked the other day why so many security breaches are hitting the headlines and are seemingly getting larger and more frequent. The game of cyber security has changed …

Emulating the security analyst with software

This is the second installation of a two-part article discussing why static security detection methods can no longer protect enterprises from advanced hacking efforts. In this …

A call to researchers: Mix some creation with your destruction

Since I can first remember being interested in information security, my personal hacker heroes (and I’m using hacker positively here) were the researchers who discovered zero …

Does the UK need to do more to address the threat of nuclear terrorism?

The emotive nature of linking nuclear and terrorism in the same sentence leads to understandably visceral responses as we all seek to protect ourselves and our loved ones from …

How data-centric security works

The traditional methods of how to address information security have all been for ages about protecting the perimeter and the network, protecting where the files are located. …

Instilling a culture of cyber security

Every company that sells cyber security technology markets how their tools will “defend”, “stop threats” and “protect”. There is no doubt that the technologies that exist …

How to develop effective honeypots

Honeypots – decoy systems used for learning cyber attackers’ capabilities and potential objectives – can be very useful to organizations, businesses, and …

Microsoft releases critical patches, improves IE security

This June Patch Tuesday we have a slightly smaller patch load from Microsoft, taking us back to more historic average releases of eight bulletins. We have just two critical …

Proactive FISMA compliance with continuous monitoring

After a great deal of debate and delay, the Federal Information Security Management Act (FISMA) finally saw a substantive update in December 2014. For federal agencies and the …

Windows 10: More security with non-stop patching

Microsoft is ready to abandon the longstanding patching schedule that saw patches and security updates being delivered on the second Tuesday of every month. With the advent of …

Cookie warnings: Useless and bad for security?

Cookies are the official and standard and preferred way of keeping state in the (otherwise) stateless HTTP protocol. They are sometimes used for keeping track of a user beyond …

Don't miss

Cybersecurity news