How can parents keep their children safe on the Internet?
In today’s society, children are unquestionably more tech-savvy than ever before, with far greater access to gadgets and a veritable wealth of information at their …
Modes of defense against security breaches in healthcare
It’s no secret that data security has serious implications for healthcare providers. A major breach can seriously undermine public trust – and result in hefty …
Password security is not just a user problem
When high profile password compromises occur, we often spend a lot of time focusing on advice to the users – “Use strong passwords;” “Don’t reuse …
Education is the key to increasing mobile security
The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …

Data Protection for Photographers
Today's high resolution digital cameras ensure that active photographers have to manage massive amounts of data. Keeping this data safe in the long run can present a …
We can fix security, but it’s not going to be easy
When I think about computer security, I like to go back to its early days and compare the situation then with the situation now. Taking a step back is very useful because, …
Top tips to protect systems against insider misuse
The 2014 Verizon Data Breach Investigations Report revealed a disturbing trend, which is the fact that users’ access rights have become a weak point in the security …
Behavioral analysis and information security
In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security, how behavioral analysis can …
How to keep your contactless payments secure
Contactless transactions – ranging from access control and ticketing to financial payments – emerged almost two decades ago and, since then, have become widely …
How to talk infosec with kids
As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like …
Emerging cloud threats and how to address them
As organizations deploy and harness private, community and hybrid clouds, they encounter new types of threats, along with the old ones they’ve been battling for years. …
Best practices for skimming prevention
The PCI Security Standards Council released an update to its guidance for merchants on protecting against card skimming attacks in POS environments. Card skimming continues to …
Featured news
Resources
Don't miss
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on