
Know your enemy: The most popular hacking methods
Outsiders want to become insiders with the least possible effort, and insiders help them do so – mostly accidentally, according to Balabit. 54% of the survey respondents …

IoT security guidelines for providers, vendors, and network operators
The GSMA Association has published new guidelines designed to promote the secure development and deployment of services in the growing Internet of Things (IoT) market. …

5 ways to protect your company data from internal attacks
While Hollywood may love the image of the hacker lurking in the shadows, stealthily pillaging from across cyberspace, the reality is that threats from inside your network, …

Modern IRM: Securing the future of work
No matter what business you’re in, the one thing you produce more than anything else is text. Every day, you and your colleagues are creating, discussing, and documenting …

Your board and cyber risk: Reimagining security protocols from the top down
As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the …

Defending the smart grid: What security measures to implement
Smart grids are a fundamental component of the European critical infrastructure. They are rooted on communication networks that have become essential elements allowing the …

The history of cyber attacks: From ancient to modern
In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a …

Data protection and breach readiness guide
The Online Trust Alliance (OTA) released its 2016 Data Protection and Breach Readiness Guide, which provides prescriptive advice to help businesses optimize online privacy and …

A possible future for IoT security
There are many problems with Internet of Things devices, and security is one of the biggest ones. To serve as an example of this important issue, two researchers from …

Review: Automating Open Source Intelligence
Editors: Robert Layton and Paul Watters Pages: 222 Publisher: Syngress ISBN: 0128029161 Introduction You can discover a lot – too much, some believe – by digging …

There’s no turning back: Say goodbye to the perimeter
If you’ve been following the announcements from this year’s Consumer Electronics Show is Las Vegas, you couldn’t have missed Ford’s partnership announcement with Amazon. …

Review: Google Hacking for Penetration Testers, Third Edition
Authors: Johnny Long, Bill Gardner, Justin Brown. Pages: 234 Publisher: Syngress ISBN: 0128029641 Introduction The Internet can be a great source of information, and Google …