Expert analysis
The evolution of vendor risk management in financial institutions
The Financial Services industry has long been recognized as a leader in establishing many of the security and fraud detection practices that have influenced best practices in …
Information security innovation and research
Sin-Yaw Wang is the Vice President of Engineering at WatchGuard Technologies. In this interview he talks about the the main challenges for delivering innovative information …
Preventing fraud through enterprise password management
The past few years the world has seen various incidents where students have fraudulently modified their school grades, progress reports and attendance records. Recently, there …
When it comes to patient data privacy, compliance and security differ
If a name perfectly underscored a growing issue of concern, it’s Anthem. In February, the health insurance plan provider disclosed cyber attackers had breached its IT …
Protecting healthcare records from cyber attacks is a game of cat and mouse
The never-ending battle between healthcare organisations and cyber attackers has always been like a game of cat and mouse. The hacker plays the role of the mouse, constantly …
Smartwatches and corporate data
I was super excited when my wife got me a smartwatch. In addition to the geeky coolness factor of a smartwatch, being a long-time security professional I was also interested …
Hack yourself first: How we can take the fight to the black hats
The Internet has increased the interconnectivity of everyone and everything on the globe. From healthcare to commerce, public services and beyond, being connected has enriched …
A few small steps for man, a giant leap for online security
The online world is vast. Just follow these straightforward tips, which will make it harder for hackers, and keep you secure. Open wireless access points As you take a seat on …
3 ways to advocate for data security at your company
There’s an unfortunate tendency among many businesses to rank data security well below other functions. It’s a familiar story: firms slash resources at the first …
HITB Haxpo: Connecting hackers, makers, builders and breakers
Youri van der Zwart is running HITB Haxpo – a free exhibition for hackers, makers and software developers taking place alongside the Hack In The Box conference in …
Black hole routing: Not a silver bullet for DDoS protection
As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the …
Continuous Diagnostics and Mitigation capability requirements need re-prioritization
There is a lot to like in the $6 billion Continuous Diagnostics and Mitigation (CDM) program being administered by the DHS across more than 100 federal civilian agencies. The …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users