Please turn on your JavaScript for this page to function normally.
Cloud security: Do you know where your data is?

The rapid move towards virtualization and cloud infrastructure is delivering vast benefits for many organizations. In fact, Gartner has estimated that by 2016, 80% of server …

Big Data analytics to the rescue

In the battle against cyber criminals, the good guys have suffered some heavy losses. We’ve all heard the horror stories about major retailers losing tens of millions of …

10 strategies to protect patient information

Data breaches, lawsuits, medical identity theft—all cringe-worthy realities—and the threats to patient data have never been greater. With cybercrime targeting healthcare, …

When should unauthorized computer access be authorized?

Recently, the decentralized hacktivist collective, Anonymous, launched an attack campaign called Operation KKK (#OpKKK), targeting the racist hate group called the Klu Klux …

Cloud lock
CSA Guide to Cloud Computing

Authors: Raj Samani, Brian Honan, Jim Reavis Pages: 236 Publisher: Syngress ISBN: 0124201253 Introduction The title says it all: this is a book that will tell you what cloud …

POODLE attack now targeting TLS

There’s a new SSL/TLS problem being announced today and it’s likely to affect some of the most popular web sites in the world, owning largely to the popularity of …

Software security in a market for lemons

There is little doubt that it’s difficult to develop secure software. First, you need to be aware of the need for security, accepting it as an important element of …

Whitepaper: 10 Things Your Next Firewall Must Do

NOTE: This whitepaper is no longer available, thanks for your interest. Over time, the fundamental functions your firewall executed have been nullified by the very traffic …

Protecting your child’s digital identity

Each day, as infosec professionals, we dedicate ourselves to protecting our client’s most valuable assets. We spend countless hours focused on keeping data, intellectual …

Improving your readiness for OCR audits

In the wake of healthcare data breaches, OCR audits for HIPAA compliance have become more common – and the consequences have been more highly publicized. But many …

Best practices in knowledge-based authentication

Knowledge-based authentication (KBA) is a methodology gaining increasing recognition for providing the identity proofing part of user authentication. A group of senior IT pros …

The 2014 Firewall Buyers Guide

NOTE: This whitepaper is no longer available, thanks for your interest. Make an informed decision on the right firewall for your business with this guide from Palo Alto …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools