Expert analysis
How to protect from threats against USB enabled devices
Reports have been circulating that e-cigarette chargers from China were corrupted and infected machines with malware. Many journalists took the story at face value, even …
Boards must up their game before the hackers claim checkmate
In today’s climate, the cyber security paradigm is a reactive cycle. When a threat is uncovered, it is examined and a counter-measure is created, with response times …
How vulnerable is our critical national infrastructure?
Considered the backbone of the nation’s economy, security and health; critical infrastructure provides power, water, transportation, and communications systems relied on …
I don’t need friends, I have followers
Admittedly, I didn’t really mean to utter those words but found them coming out of my mouth nonetheless. Well what else do you say when an eight year old ridicules you …
Look where you’re going before backing up
For all intents and purposes, the 31st of March is not a day that infers significance. It is the 90th day in the Gregorian calendar (leap years aside), and is the home for …
10 practical security tips for DevOps
More organizations are embracing DevOps and automation to realize compelling business benefits, such as more frequent feature releases, increased application stability, and …
Crowdsourcing your bug bounty program
In this interview, David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way. …
The multiple benefits of IT auditing
Regulatory compliance requirements provide instructions for organizations on how to protect the data of their employees, business operations, and customers that are stored on …
Behavioral biometrics: The password you can’t forget
This year’s Mobile World Congress featured more biometrics technology than ever before, with the launch of Google’s Android Pay and Samsung Pay both unveiling …
Banks and IT security: The elements of success
In this interview, Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank, …
Data lurking: How to protect your company against overlooked insider threats
Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come …
Implementing an effective risk management framework
In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies