Please turn on your JavaScript for this page to function normally.
Will 2015 be the year of risk-based security?

As 2014 comes to a close, many of us are beginning to look ahead at the expected trends for the coming year. For those of us in cybersecurity who are at the forefront of …

Actions to strengthen your defense, minimize damage

IT professionals should use the nearly epic scale of the Sony cyber attacks to spur their companies into action versus panicking about potential risks. “The FBI is right …

Cybercrime will continue to evolve

The breadth and depth of the data breaches seen by the world in 2014 was shocking – spanning major banks, e-commerce giants, healthcare giants, casinos and others, …

Week in review: ICANN systems breached, critical Git and SOHO router flaws

Here’s an overview of some of last week’s most interesting news, reviews and articles: The problem with security shortcuts A combination of irresponsible user …

Cybercriminals won’t take a vacation this holiday season

The holiday period is a time to celebrate with family and loved ones. Unfortunately, cybercriminals will use the season to take advantage of businesses as IT staff and end …

Your email, your data, your control

In the U.S., we are willing to trade our privacy and security in exchange for convenience. Think about the last time you stored your password on a website, kept a credit card …

Top 5 social media security predictions for 2015

Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015. Studies in the last year on …

Smart grid security certification in Europe

ENISA issues a report on smart grid security certification in Europe targeted at EU Member States (MS), the Commission, certification bodies and the private sector; with …

python
Python Forensics

Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a “no-nonsense resource for the rapid development of new …

Only 1% of consumers feel safe using mobile payments

Evaluating online cybersecurity awareness of 2,011 consumers from the U.S. and U.K., a new survey by One Poll and Dimensional Research revealed that more than 40 percent of …

Application Threat and Usage Report 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic …

Tackling the growing web of data residency and privacy regulations

With an increasing number of companies moving to the cloud, we’ve seen a surge in investment by cloud providers to build international datacenters. While these …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools