Please turn on your JavaScript for this page to function normally.
5 things infosec can learn from adventure games

As an active adventure gamer and a natural seeker of reusable patterns, I’ve noticed that some of the things I do to achieve success in video games can be applied to …

10 most significant software security design flaws

The IEEE Center for Secure Design, a cybersecurity initiative focused on the identification of software design flaws, released a report based on real-world data collected and …

Why every security-conscious organization needs a honeypot

You’ve probably heard the phrase about “canaries in a coal mine.” In the mid 1900s, a guy named John Haldane figured out that birds die pretty quickly when …

Point of Sale system architecture and security

To most people, Point of Sale (POS) systems with integrated payment processing are a black box where magic happens. In this podcast recorded at Black Hat USA 2014, Lucas …

How important is website security?

In this interview, Nicholas Sciberras, Product Manager at Acunetix, illustrates why website security should be a priority in any organization. He talks about the challenges …

Securing the U.S. electrical grid

The Center for the Study of the Presidency & Congress (CSPC) launched a project to bring together representatives from the Executive Branch, Congress, and the private …

8 ways to talk security with executive management

The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive …

NIST vetting guide helps in testing mobile apps

While many mobile device apps such as a calendar or collaboration tools are very handy and can improve productivity, they can also introduce vulnerabilities that can put …

Mobile device security: Tackling the risks

Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a …

Infographic: How secure is Bitcoin?

The security of Bitcoin transactions is one of the main drawbacks of the digital currency. The infographic below takes a look at what you need to know to stay vigilant. Click …

BGP hijacking for cryptocurrency profit

In cryptocurrency, “mining” is the act of validating transactions listed in the public ledger (also known as the block chain). When a transaction is initiated, it …

Successful strategies to avoid frequent password changes

1.2 billion passwords reportedly stolen by Russian hackers. Before that it was Heartbleed. After a widespread, nonspecific data breach, the conventional wisdom is that people …

Don't miss

Cybersecurity news