Please turn on your JavaScript for this page to function normally.
Cost of breach vs. cost of deployment

In security terms, 2014 read like a who’s who of data breaches. Huge, global companies like Target, eBay and Coca-Cola have succumbed to data loss. Public services like …

Don’t look back in anger

At the end of the 2014, as at the end of many years before it, our mailboxes were filled with various vendors’ security predictions for 2015. We saw them also in …

Identity management trends in 2015

A new year is always an excellent time to look ahead. So, there’s not much of a better time than now to look at some of the identity management trends expected for the …

Do we need regular IT security fire drills?

IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …

The ubiquitous social media “buy’ button and the journey of authentication

Earlier this year two of the world’s largest social media sites, Facebook and Twitter, announced the addition of “buy’ buttons to their offerings, giving …

The coming shift in security

Vendors continue to trumpet new platforms as the best way to improve enterprise-level security. Flashy spinning visualizations, added scalability and the meaningless …

Top 3 reasons businesses should prioritize web security

2014 was a year of high-profile hacks for businesses around the world. From The Home Depot breach to the recent Sony data leak, it seemed like as soon as one data breach was …

The one compliance lesson you need to learn

We are living in a data driven society with globalizing economies, data transfer, and ubiquitous access to everything from everywhere. At the same time, we have seen an influx …

Four cyber security risks not to be taken for granted

It’s pretty difficult to make information security predictions, and even more difficult to verify them afterwards: we can only judge the effectiveness of information …

Identity theft for dummies

It happened again. Checking into the hotel, I was asked if I can provide my credit card to cover additional expenses (not unusual). However, the receptionist simply wrote my …

Infosec: More than reindeer games

Dear Santa, As CEO of XMAS Inc., the leading manufacturing and shipping enterprise, you face extraordinary pressure to deliver joy on Christmas morning to billions of kids …

5 working days left until the deadline for compliance with PCI DSS 3.0 kicks in

Maintaining credit and debit card information on behalf of financial services clients demands the highest levels of security and customer confidence, and adhering to standards …

Don't miss

Cybersecurity news