Please turn on your JavaScript for this page to function normally.
Cloud provider assurance: Trust but verify

Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and cloud privacy and compliance …

Voter database security is a myth

Some of us spend days and months of indecision, hours in front of the TV watching campaign commercials and presidential debates, researching on the Net, mulling the options …

Security as an enabler of innovation

For years, many enterprises have viewed IT security as a costly extra that has to be endured as a way to reduce risk, without providing any other value to the business. Recent …

Interesting times for information security professionals

There is an old saying, which some attribute as an old Chinese proverb, that states “May you live in interesting times.” Some say that this is a blessing you may …

Inside SANS London 2012

Matt Anderson is the Director, EMEA at SANS Institute. In this interview he talks about SANS London 2012, Europe’s biggest and most important information security …

5 bad things IT administrators do

Philip Lieberman is the President at Lieberman Software Corporation and in this video talks about five awful things that IT administrators do and offers ways to fix these actions.

Information-related risks, threats and compliance

Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is a member of the Commission on Cyber Security for the 44th President and several executive …

The QR code: A new frontier in mobile attackability

A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …

Solving the portable data security headache

Protecting intellectual property and sensitive information is a major security concern for any business today – especially against the backdrop of workers needing to …

Networkless working: The future of the public sector?

It is no secret that the UK Government is still running at a significant loss. It is therefore no surprise that organisations are having to cut costs, and for the public …

Preparing for your first security breach

So you’ve finally accepted it’s just a matter of time before you experience your first major breach. Despite all the work you’ve put in to your monitoring …

Fast and furious reverse engineering

Tomislav Pericin is one of the founders of ReversingLabs and the company’s Chief Software Architect. In this video, recorded at Hack in The Box Amsterdam 2012, he talks …

Don't miss

Cybersecurity news