Expert analysis
Smartwatches and corporate data
I was super excited when my wife got me a smartwatch. In addition to the geeky coolness factor of a smartwatch, being a long-time security professional I was also interested …
Hack yourself first: How we can take the fight to the black hats
The Internet has increased the interconnectivity of everyone and everything on the globe. From healthcare to commerce, public services and beyond, being connected has enriched …
A few small steps for man, a giant leap for online security
The online world is vast. Just follow these straightforward tips, which will make it harder for hackers, and keep you secure. Open wireless access points As you take a seat on …
3 ways to advocate for data security at your company
There’s an unfortunate tendency among many businesses to rank data security well below other functions. It’s a familiar story: firms slash resources at the first …
HITB Haxpo: Connecting hackers, makers, builders and breakers
Youri van der Zwart is running HITB Haxpo – a free exhibition for hackers, makers and software developers taking place alongside the Hack In The Box conference in …
Black hole routing: Not a silver bullet for DDoS protection
As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the …
Continuous Diagnostics and Mitigation capability requirements need re-prioritization
There is a lot to like in the $6 billion Continuous Diagnostics and Mitigation (CDM) program being administered by the DHS across more than 100 federal civilian agencies. The …
Declaring personal data bankruptcy and the cost of privacy
In the digital economy, your data profile has value, but judging from what I watched happen recently in a London shopping mall, a lot of us give it away for free. At the …
BYOD: Better stay used to it
BYOD is a common trend in organizations today. Businesses may be thrilled they don’t have to pay for tablets or smartphones for their workforce and don’t usually …
RSA Conference 2015: Showcasing the future of information security
Linda Gray is the General Manager of RSA Conferences. In this interview she talks about the growth of RSA Conference, outlines the threats that helped shape this year’s …
Are organizations ready for the embedded computing takeover?
It is bordering on cliché to acknowledge that the Internet is a double-edged sword. As time goes by, the statement takes on even greater significance, in light of its …
Kill Chain 3.0: Update the cyber kill chain for better defense
If you’re in infosec, you’ve surely heard of the kill chain – a defense model designed to help mitigate more advanced network attacks. The kill chain …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies