Please turn on your JavaScript for this page to function normally.
Why senior managers need to be involved in data security

The networking environment has changed radically in recent times. In today’s world of increasing wireless use, widespread BYOD, more home working, more remote access, …

The evolution of vendor risk management in financial institutions

The Financial Services industry has long been recognized as a leader in establishing many of the security and fraud detection practices that have influenced best practices in …

Information security innovation and research

Sin-Yaw Wang is the Vice President of Engineering at WatchGuard Technologies. In this interview he talks about the the main challenges for delivering innovative information …

Preventing fraud through enterprise password management

The past few years the world has seen various incidents where students have fraudulently modified their school grades, progress reports and attendance records. Recently, there …

Defending against PoS RAM scrapers

Stealing payment card data has become an everyday crime that yields quick monetary gains. Attackers aim to steal the data stored in the magnetic stripe of payment cards, …

Listen to your employees or deal with shadow IT

Data leakage, compliance breaches, business inefficiency and hidden costs are just some of the risks organizations are leaving themselves open to by not meeting the IT demands …

When it comes to patient data privacy, compliance and security differ

If a name perfectly underscored a growing issue of concern, it’s Anthem. In February, the health insurance plan provider disclosed cyber attackers had breached its IT …

Protecting healthcare records from cyber attacks is a game of cat and mouse

The never-ending battle between healthcare organisations and cyber attackers has always been like a game of cat and mouse. The hacker plays the role of the mouse, constantly …

Smartwatches and corporate data

I was super excited when my wife got me a smartwatch. In addition to the geeky coolness factor of a smartwatch, being a long-time security professional I was also interested …

Hack yourself first: How we can take the fight to the black hats

The Internet has increased the interconnectivity of everyone and everything on the globe. From healthcare to commerce, public services and beyond, being connected has enriched …

A few small steps for man, a giant leap for online security

The online world is vast. Just follow these straightforward tips, which will make it harder for hackers, and keep you secure. Open wireless access points As you take a seat on …

Expert tips to address third party security risks

Risks to sensitive data have never been greater. With the rise in cyber attacks and data breaches, outsourcing to third parties can present an exponential threat to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools