Please turn on your JavaScript for this page to function normally.
Questioning Google’s disclosure timeline motivations

The presence of 0-day vulnerability exploitation is often a real and considerable threat to the Internet – particularly when very popular consumer-level software is the …

Profiling modern hackers: Hacktivists, criminals, and cyber spies

Sun Tzu, the renowned military strategist and author of The Art of War, was known for the saying, “Know thy enemy and known thyself, and you will not be imperiled in a …

Automate your way out of patching hell

IT departments are often criticised for their remoteness from the business. One cause could be highlighted by recent research numbers from IDC, which found that as much as 70 …

Plugging the trust gap

Every business and government is dependent upon cryptographic keys and certificates to provide trust for critical communications. These trust technologies underpin the modern …

Is it time to professionalize information security?

The issue of whether or not information security professionals should be licensed to practice has already been the topic of many a passionate debate. I think it is time to …

The CSO perspective on healthcare security and compliance

Randall Gamby is the CSO of the Medicaid Information Service Center of New York. In this interview he discusses healthcare security and compliance challenges and offers a …

Hacking charge stations for electric cars

The vision of electric cars call for charge stations to perform smart charging as part of a global smart grid. As a result, a charge station is a sophisticated computer that …

Human sensors: How encouraging user reporting strengthens security

Despite the pervasiveness of cyber-attacks threatening the enterprise security today, many organizations are still not taking advantage of their most widely deployed security …

Car and electronics shoppers at risk of escrow fraud

Cars, motorbikes and electronics top the list of items that scammers use most to swindle online shoppers in the growing underworld of escrow fraud, according to our recent …

Bringing networking and security together through network automation

The past ten years have seen a proliferation of increasingly complex network devices. Coupled with the recent rise in adoption of BYOD policies, mobile working practices, …

The CSO perspective on risk management

Candy Alexander is the CSO at Long Term Care Partners and volunteers as a member of the International Board of Directors for ISSA. In the past, she was invited to the White …

The importance of secure coding

Jim Manico is the VP of Security Architecture for WhiteHat Security. In this video recorded at Hack In The Box 2013 Amsterdam, Manico illustrates the importance of secure …

Don't miss

Cybersecurity news