Please turn on your JavaScript for this page to function normally.
Data Protection For Photographers
Data Protection for Photographers

Today's high resolution digital cameras ensure that active photographers have to manage massive amounts of data. Keeping this data safe in the long run can present a …

We can fix security, but it’s not going to be easy

When I think about computer security, I like to go back to its early days and compare the situation then with the situation now. Taking a step back is very useful because, …

Top tips to protect systems against insider misuse

The 2014 Verizon Data Breach Investigations Report revealed a disturbing trend, which is the fact that users’ access rights have become a weak point in the security …

Behavioral analysis and information security

In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security, how behavioral analysis can …

How to keep your contactless payments secure

Contactless transactions – ranging from access control and ticketing to financial payments – emerged almost two decades ago and, since then, have become widely …

How to talk infosec with kids

As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like …

Emerging cloud threats and how to address them

As organizations deploy and harness private, community and hybrid clouds, they encounter new types of threats, along with the old ones they’ve been battling for years. …

Best practices for skimming prevention

The PCI Security Standards Council released an update to its guidance for merchants on protecting against card skimming attacks in POS environments. Card skimming continues to …

Securing virtual machines: Considerations for the hybrid cloud

With enterprises’ growing interest in adopting the hybrid cloud, Cloud Service Providers (CSPs) want to develop premium cloud offerings that fuel the rate of this …

Using thermal imaging for security

Do you work in counter surveillance or physical penetration testing? The physical security field in general? If yes, have you considered using a thermal imaging camera to help …

Are free file storage solutions a safe bet for businesses?

The benefits of cloud computing are becoming increasingly recognized, and with this heightened understanding comes growing numbers of UK businesses that are embracing the use …

How a large ISP fights DDoS attacks with a custom solution

DDoS attacks are a growing problem. In July, Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure that shows a surge in …

Don't miss

Cybersecurity news