
IoT creates new set of risks, orgs embrace active defense
If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns – and a shift in how companies are …

Security guidance for early IoT adopters
The Internet of Things (IoT) provides new and enhanced capabilities across diverse industries and enterprise functions, as well as unique security challenges associated with …
Consumers think passwords are of no value to criminals
21 percent of respondents to a Kaspersky survey assume their passwords are of no value to criminals. Many often take the easy way out when creating and storing passwords. For …
The key challenges to timely incident response
Security professionals are inundated with security incidents, averaging 78 investigations per organization in the last year, with 28 percent of those incidents involving …
CoinVault ransomware: Retrieve data without paying the criminals
Victims of the CoinVault ransomware have a chance to retrieve their data without having to pay the criminals, thanks to a repository of decryption keys and a decryption …
The need for end-user visibility in a Bring Your Own Anything environment
Mobiles, tablets, PCs, applications, cloud services – employees are increasingly bringing non-company devices into their organizations and connecting them to everything …
Guide outlines specifications of smart card-based PACS
Smart cards are increasingly accepted as the credential of choice for securely authenticating identity, determining appropriate levels of information access and controlling …
How to protect from threats against USB enabled devices
Reports have been circulating that e-cigarette chargers from China were corrupted and infected machines with malware. Many journalists took the story at face value, even …
Guidelines on the auditing framework for Trust Service Providers
A new ENISA report provides guidelines on the auditing framework for Trust Service Providers (TSPs). These guidelines can be used by TSPs (preparing for audits) and Conformity …
Look where you’re going before backing up
For all intents and purposes, the 31st of March is not a day that infers significance. It is the 90th day in the Gregorian calendar (leap years aside), and is the home for …
10 practical security tips for DevOps
More organizations are embracing DevOps and automation to realize compelling business benefits, such as more frequent feature releases, increased application stability, and …
Crowdsourcing your bug bounty program
In this interview, David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way. …
Featured news
Resources
Don't miss
- NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)
- Git vulnerability leading to RCE is being exploited by attackers (CVE-2025-48384)
- Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO
- LLMs at the edge: Rethinking how IoT devices talk and act
- How to build a secure AI culture without shutting people down