Please turn on your JavaScript for this page to function normally.
Overcoming Big Data security obstacles

When it comes to security, Big Data can be the cause of many obstacles. As Big Data often contains enormous quantities of personally identifiable information, privacy becomes …

Enterprises must prepare for attacks on supply chain and POS in 2015

One thing is certain – there is plenty of job security in the business of protecting data. Attackers keep upping their game therefore, so must we. 2014 can be …

EFF: Use VPN to avoid Verizon’s tracking header

If you are a Verizon mobile customer, here is another reason to start using VPN or Tor: to protect your online movements from being tracked by website owners and third-party …

Three branches of security: Strengthening your posture with checks and balances

With Election Day around the corner, we thought it an appropriate time to take a look at the checks and balances model that has served the United States well for over two …

Targeting security weaknesses in the phone channel

Fraud over the phone channel is a significant problem for businesses, both small and large. Recently, phone hackers targeted a small architecture firm in Georgia, costing them …

Things that freak out IT security pros

Ghosts and zombies aren’t the only things coming back from the dead this Halloween. Below is a list of the top security threats that organisations should be most aware …

What’s jeopardizing the safety of your datacenter?

Datacenters are fraught with hidden operational hazards, and because virtual infrastructure is extremely complex and dynamic, many vulnerabilities go undetected and can be …

IT is losing the battle on security in the cloud

A majority of IT organizations are kept in the dark when it comes to protecting corporate data in the cloud, putting confidential and sensitive information at risk. This is …

Fixing the broken windows of software security

Last month I discussed how we can fix software security issues only by making sure we use libraries and frameworks that don’t allow classes of vulnerability to exist. Of …

Automation is the key to successful policy implementation

Organizations today are facing increased pressure to collect and store massive amounts of data. Regulatory guidelines, storage costs, and the promise of Big Data have …

Explaining infosec magic to kids

Magic! It’s the basis for countless children’s stories filled with adventure and excitement. It’s also how many kids think cyberspace works. There’s …

Targeted attack protection via network topology alteration

When it comes to targeted attacks, attackers are not omniscient. They need to gather information in the early stages to know the target they may gather information from …

Don't miss

Cybersecurity news