Please turn on your JavaScript for this page to function normally.
Compliance misconceptions, challenges and tips

In this interview, Paul Koziarz, President and General Manager of Regulatory Compliance at CSI, talks about the misconceptions related to compliance, provides advice for CSOs …

Why ending user support for Microsoft XP is the right thing to do

Today is the day that Microsoft’s well-documented plans to end support for Windows XP comes into fruition, and with roughly 30 per cent of all desktop computers …

A security advisor’s perspective on the threat landscape

In this interview, Sean Sullivan, the Security Advisor at F-Secure Labs, talks about threats he’s seen during his career, iOS vs. Android security, security awareness …

CISO challenges and security ROI

Mark Brown is the Director of Information Security at EY. In this interview he offers guidance for CISOs, discusses the technical competence of company leaders, tackles …

Does IP convergence open you up to hackers?

Recent reports indicate that unauthorized persons gained access to Target’s network using credentials stolen from a company that worked on the company’s …

Windows XP will leave organizations severely exposed

The clock is ticking – as of this week Microsoft will no longer support Windows XP. The operating system will pose an increasing risk to its users, making it more …

Microsoft to release only four bulletins on Tuesday

The Microsoft April security release is almost upon us with security updates scheduled to deploy on Tuesday, April 8th. This day will go down in history as a major milestone …

This phishing page can do more than steal your credentials

Every now and again, we read reports about phishing sites that look dangerously convincing—you can hardly tell the real one apart from the fake one anymore, unless you know …

Windows XP usage lower across industries

Next week, Microsoft will deliver its last set of public security patches for Windows XP. The end-of-life for XP which has been announced for a number of years now, means that …

Mobile data leakage

Attack vectors in the mobile world are related to apps, content and web. In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, …

Risks and opportunities of personal data, privacy, and trust

The increased number of stories on data breaches in the news today has many implications, for consumers it’s an increased risk of financial loss, identity theft and …

Eight cyber security tips I learned from The Walking Dead

Sometimes two things that don’t seem to go together, make the most magical combinations. This article is the first in a new series of security articles I’ll be …

Don't miss

Cybersecurity news