Please turn on your JavaScript for this page to function normally.
Black hole routing: Not a silver bullet for DDoS protection

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the …

Continuous Diagnostics and Mitigation capability requirements need re-prioritization

There is a lot to like in the $6 billion Continuous Diagnostics and Mitigation (CDM) program being administered by the DHS across more than 100 federal civilian agencies. The …

Declaring personal data bankruptcy and the cost of privacy

In the digital economy, your data profile has value, but judging from what I watched happen recently in a London shopping mall, a lot of us give it away for free. At the …

BYOD: Better stay used to it

BYOD is a common trend in organizations today. Businesses may be thrilled they don’t have to pay for tablets or smartphones for their workforce and don’t usually …

RSA Conference 2015
RSA Conference 2015: Showcasing the future of information security

Linda Gray is the General Manager of RSA Conferences. In this interview she talks about the growth of RSA Conference, outlines the threats that helped shape this year’s …

Are organizations ready for the embedded computing takeover?

It is bordering on cliché to acknowledge that the Internet is a double-edged sword. As time goes by, the statement takes on even greater significance, in light of its …

Kill Chain 3.0: Update the cyber kill chain for better defense

If you’re in infosec, you’ve surely heard of the kill chain – a defense model designed to help mitigate more advanced network attacks. The kill chain …

INTERPOL and the fast-paced digital threat landscape

Dr. Madan Oberoi is the Director of Cyber Innovation and Outreach Directorate at the INTERPOL Global Complex for Innovation in Singapore. In this interview he talks about the …

Which kind of security professional are you?

Much has been said and written about the arrogance prevalent in the computer industry, especially that of gamers and security professionals. A well-known female gamer recently …

How can organizations guard against hackers in 2015?

Advanced persistent threats, malware sent via attachments, direct targeting of specific users through spear phishing techniques, vulnerabilities exploited to silently deliver …

IT professional, hack thyself

To anyone not living under a rock, the increasing threat of a cyber attack is very plain. IT professionals spend sleepless nights worrying that they’ll be the next …

Five key IT security trends for 2015

Here’s a look at five key IT security trends and solutions for 2015. Rise in security breaches The current high level of security breaches, from the largest organization …

Don't miss

Cybersecurity news