Please turn on your JavaScript for this page to function normally.
What will create cybersecurity challenges in 2015?

Security experts at Unisys predicted even greater cybersecurity challenges in the year ahead as continued growth in the use of mobile devices and applications in the …

Whitepaper: 10 Things Your Next Firewall Must Do

NOTE: This whitepaper is no longer available, thanks for your interest. Over time, the fundamental functions your firewall executed have been nullified by the very traffic …

Free webinar: What’s new in ISO 27001 2013 revision

Register for this webinar to learn: Main changes in ISO 27001 2013 revision Required documents for the new ISO 27001 How the transition works with certification bodies 12 …

Week in review: Sony hack, turning kids into infosec heroes, and cybersecurity in 2015

Here’s an overview of some of last week’s most interesting news and articles: Protecting your child’s digital identity Kids’ identities are stolen over …

RFID forensic evidence management

Radio frequency identification (RFID) tags—devices that can transmit data over short distances to identify objects, animals or people—have become increasingly popular for …

Complicated password rules diminish online shopping convenience

The holiday shopping season is now fully underway, but the online shopping splurge is not over yet. Over half of Europeans plan to buy their gifts online, yet many are …

Key trends in online spending

ThreatMetrix identified several key trends in online spending over the holiday weekend. Mobile represented nearly 40 percent of all transactions Throughout Cyber Week this …

Microsoft to patch three critical issues

December’s advanced Patch Tuesday brings us seven advisories, three of which are listed as Critical. The Critical issues affect, Internet Explorer, all supported …

Health insurance online threats revealed

Websites hosted by external providers, excessive mobile app permissions and third party code libraries represent the biggest risks to users of health insurance web and mobile …

Protecting your child’s digital identity

Each day, as infosec professionals, we dedicate ourselves to protecting our client’s most valuable assets. We spend countless hours focused on keeping data, intellectual …

Top 3 security, privacy and data protection trends for 2015

2014 was full of front page stories about data privacy, hacks, data jurisdiction and other threats that confirmed security is no longer a niche. Security is officially a …

Internet of Things predictions for 2015

IDC provides organizations with insight and perspective on long-term industry trends along with new themes that may be on the horizon. IoT and the cloud. Within the next five …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools