Please turn on your JavaScript for this page to function normally.
Keeping college networks secure

Morris Altman is the Director of Network Services and Internet Security Officer at Queens College, a senior college of the City University of New York. Queens College is the …

Whitepaper: Social networking and security risks

The popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be …

Is your encryption getting out of control?

2014 marks the 25th anniversary of the creation of the World Wide Web. From its earliest beginnings, users have demanded security for their sensitive information and web sites …

API security for connecting the enterprise cloud

In this interview, Don Bergal, COO at Managed Methods, answers questions regarding security around API based connections between an enterprise and the hybrid cloud. What …

What are the risks of virtual currency use?

Many consumers have heard about Bitcoin, but they don’t necessarily know anything about it: not the full spectrum of benefits, and definitely not the risks they can …

BYOD: 10 ways to fight back

The adoption of BYOD policies in SMBs means that IT has to protect devices that they didn’t even specify, procure or configure. In addition, most companies are now …

The art and science of detecting emerging threats

In this interview, Stephen Huxter, COO at Darktrace, talks about the challenges involved in detecting emerging threats, Recursive Bayesian Estimation, the evolution of AI, and …

The role of the cloud in the modern security architecture

In this interview, Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents …

Failure is an option

Information is the lifeblood of today’s business world. With timely and accurate information business decisions can be made quickly and confidently. Thanks to modern …

PC gamers increasingly under attack

Many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to …

How security analytics help identify and manage breaches

In this interview, Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today’s complex security architectures, talks about the most …

Looking at insider threats from the outside

Cybersecurity is a never-ending battle requiring around-the-clock attention. From malware to DDoS to APT attacks, front-line IT security teams are being constantly bombarded. …

Don't miss

Cybersecurity news