Securing virtual machines: Considerations for the hybrid cloud
With enterprises’ growing interest in adopting the hybrid cloud, Cloud Service Providers (CSPs) want to develop premium cloud offerings that fuel the rate of this …
Using thermal imaging for security
Do you work in counter surveillance or physical penetration testing? The physical security field in general? If yes, have you considered using a thermal imaging camera to help …
Are free file storage solutions a safe bet for businesses?
The benefits of cloud computing are becoming increasingly recognized, and with this heightened understanding comes growing numbers of UK businesses that are embracing the use …
How a large ISP fights DDoS attacks with a custom solution
DDoS attacks are a growing problem. In July, Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure that shows a surge in …
5 key things to consider when developing an enterprise mobility management strategy
To state the obvious, business success today is dependent on an organization’s ability to empower its mobile workforce. Corporate resources – including …
Whitepaper: 5 steps to improve your network’s health
When the Heartbleed bug hit, companies and customers worldwide scrambled to assess if and how the bug affected them – and, where necessary, take the required steps to …
Review your Facebook privacy settings with Privacy Checkup
Facebook’s Privacy Checkup tool – informally dubbed “Privacy Dinosaur” – has been made available for use to all users of the popular social …
Mobile forensics in a connected world
In this interview, Andrew Hoog, CEO of viaForensics, talks about the forensic examination of mobile devices, the challenges involved with testifying at trials, and offers …
Network vulnerabilities IT admins can use to protect their network
Being able to adapt to change is one of the most important abilities in security today, mostly because attacks to defend against are able to do the same. The sophistication of …
5 tips for security behavior management programs
Security awareness has long been a point of frustration for information security professionals. While many organizations conduct awareness training of some kind, they have …
9 ways to protect data on your smartphone
Recent headlines of Hollywood celebrities’ nude photos leaking onto the Internet remind us of the privacy risks we face when we store personal data – particularly …
Lessons learned from running 95 bug bounty programs
Large companies such as Google and Facebook have dedicated teams that review bug submissions, verify valid bugs and reward security researchers, but that can be time and …
Featured news
Resources
Don't miss
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- Marks & Spencer cyber incident linked to ransomware group
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on