Please turn on your JavaScript for this page to function normally.
Security awareness training: Why it matters

Dr. Peter Lokhorst is Managing Director of InfoSecure BV, which is currently in seven countries and provides awareness training programs to international clients including …

Exploring the complexity of modern cyber attacks

James Holley is an Executive Director at Ernst & Young LLP. In this interview he discusses the complexity of modern cyber attacks, the challenges involved in maintaining …

Tips for handling your first security breach

When it comes to data breaches, the risk for organizations is higher than ever before – from the calculable costs of leaked data to the less tangible effects on the …

Effective incident response

Organizations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical – but among those needles are little threads of …

Cyber risks awaiting visitors and viewers of Sochi 2014 Olympics

The 2014 Winter Olympics are set to start on Friday in Sochi, a Russian city located on the shores of the Black Sea. There have been many controversies regarding this choice …

Five lessons we can learn from financial services and compliance

Banks and financial services organisations have been a prime target for hackers for a very long time, and as a result of this the industry has had to adhere to security …

A solution for fixing hijacked Chrome settings

Many users – if not all – have experienced downloading a free screensaver or game without looking at the small print and consequently getting their browser …

How a fake antivirus attack works

Earlier this month, Invincea researchers have warned about visitors of video-sharing website Dailymotion being targeted with malicious ads leading to bogus infection warnings …

Defending against drive-by downloads

In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …

Why governance and policy can strengthen compliance efforts

A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …

How to recover deleted or corrupted digital currency

The popularity of Bitcoin and other digital / cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of …

Smartphone spying: How can users protect themselves?

Smartphone users need to realise that their mobile phone is less of a phone and more of a mobile computer, in which applications can collect data from other applications …

Don't miss

Cybersecurity news