Please turn on your JavaScript for this page to function normally.
Sqrrl
Getting a start on cyber threat hunting

In this age of advanced persistent threats, waiting for traditional threat management solutions like IDS and SIEM to flag incidents and threats is simply not enough anymore. …

businessman
Learning from success: Brian Honan’s infosec journey

When Brian Honan started his information security consultancy thirteen years ago, most of his conversations were with those in charge of IT and/or IT security within an …

hands
Enterprise security culture: Why you need it, and how to create it

Security awareness is a term that most information security professionals are familiar with – security culture a little less so. “Security awareness training is …

Siemplify
Creating the security operations center of the future with Siemplify

Security operations teams are engaged in a constant struggle to keep up with the volume of security alerts, maintain the right skills, and manage incident response processes. …

macOS High Sierra
The future of macOS security: Baked-in protection and third-party tools

Anyone in the information security industry who’s interested in Mac security probably knows who Patrick Wardle is. Apart from being Chief Security Researcher at Synack, …

magnifying glass
The role of web filtering in a modern security architecture

In its most basic and simplest form, filtering access to content on the web can be achieved by rather blunt instruments such as DNS black-holes. And, in the early 2000s, this …

GDPR
Why companies shouldn’t dread the advent of GDPR

The main aim of the General Data Protection Regulation (GDPR) is to make sure that the data of EU citizens is protected, no matter where it’s held. The regulation, which will …

architect
What’s an IT architect, and could you become one?

If you’re a Computer Science student or an IT professional looking for a new job that’s interesting, well paid, and for which demand is constant, you might want to …

cube
Software security assurance: Everybody’s invited

As more and more things in this world of ours run on software, software security assurance – i.e. confidence that software is free from vulnerabilities (either …

Businessman
Security awareness is good, but good security culture is better

As an efficient mechanism to influence employee behavior, security culture is one of the most important, yet most overlooked, aspects of organizational security. “A …

spotlight
Executive spotlight: iovation’s new Vice President of Product

Last week iovation announced that Dwayne Melancon was leaving Tripwire after 17 years and joining the company as the new Vice President of Product, so we decided to get in …

Wi-Fi
Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices

Karma has long been a staple man-in-the-middle attack used in authorised wireless security assessments and unsanctioned ones, but as many modern operating systems now provide …

Don't miss

Cybersecurity news