Please turn on your JavaScript for this page to function normally.
How to talk infosec with kids

As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like …

Bug bounty programs: The road to hell is paved with good intentions

Bug bounties are in the news again. Twitter has announced its own new scheme, while Robert Graham of Errata Security claims legal actions brought for loss of personal data …

Emerging cloud threats and how to address them

As organizations deploy and harness private, community and hybrid clouds, they encounter new types of threats, along with the old ones they’ve been battling for years. …

Securing virtual machines: Considerations for the hybrid cloud

With enterprises’ growing interest in adopting the hybrid cloud, Cloud Service Providers (CSPs) want to develop premium cloud offerings that fuel the rate of this …

Are free file storage solutions a safe bet for businesses?

The benefits of cloud computing are becoming increasingly recognized, and with this heightened understanding comes growing numbers of UK businesses that are embracing the use …

Apple built multi-factor authenticated payment in the right order

As an American living in Europe I have been perplexed at multi-factor authentication for payments. The Americans (laggards in my opinion) have been using magnetic stripe cards …

5 key things to consider when developing an enterprise mobility management strategy

To state the obvious, business success today is dependent on an organization’s ability to empower its mobile workforce. Corporate resources – including …

Why open source and collaboration are the future of security

In this podcast recorded at Black Hat USA 2014, Greg Martin, CTO at ThreatStream, talks about why open source and collaboration are the key drivers of information security …

Mobile forensics in a connected world

In this interview, Andrew Hoog, CEO of viaForensics, talks about the forensic examination of mobile devices, the challenges involved with testifying at trials, and offers …

Malicious and risky apps on Android and iOS

Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc. In this podcast recorded at Black Hat …

5 tips for security behavior management programs

Security awareness has long been a point of frustration for information security professionals. While many organizations conduct awareness training of some kind, they have …

Lessons learned from running 95 bug bounty programs

Large companies such as Google and Facebook have dedicated teams that review bug submissions, verify valid bugs and reward security researchers, but that can be time and …

Don't miss

Cybersecurity news