Expert analysis
Modes of defense against security breaches in healthcare
It’s no secret that data security has serious implications for healthcare providers. A major breach can seriously undermine public trust – and result in hefty …
Password security is not just a user problem
When high profile password compromises occur, we often spend a lot of time focusing on advice to the users – “Use strong passwords;” “Don’t reuse …
Education is the key to increasing mobile security
The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …
How threats shape cloud usage
In this interview, Ravi Ithal, Chief Architect at Netskope, discusses the top threats to cloud security and how they are changing the way we’re using the cloud. He also …
We can fix security, but it’s not going to be easy
When I think about computer security, I like to go back to its early days and compare the situation then with the situation now. Taking a step back is very useful because, …
Behavioral analysis and information security
In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security, how behavioral analysis can …
How to keep your contactless payments secure
Contactless transactions – ranging from access control and ticketing to financial payments – emerged almost two decades ago and, since then, have become widely …
Security compliance is necessary for real-time mobile data access
Security compliance often varies from organisation to organisation due to varied industry regulation as well as internal security policies and procedures. We often see …
How to talk infosec with kids
As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like …
Bug bounty programs: The road to hell is paved with good intentions
Bug bounties are in the news again. Twitter has announced its own new scheme, while Robert Graham of Errata Security claims legal actions brought for loss of personal data …
Emerging cloud threats and how to address them
As organizations deploy and harness private, community and hybrid clouds, they encounter new types of threats, along with the old ones they’ve been battling for years. …
Securing virtual machines: Considerations for the hybrid cloud
With enterprises’ growing interest in adopting the hybrid cloud, Cloud Service Providers (CSPs) want to develop premium cloud offerings that fuel the rate of this …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse