Please turn on your JavaScript for this page to function normally.
Who should be responsible for protecting your online privacy?

Just in time for Data Privacy Day, Microsoft has released the results of a survey that shows the privacy attitudes of technology savvy individuals in the US and four European …

DDoS attacks become smarter, faster and more severe

DDoS attacks will continue to be a serious issue in 2014 – as attackers become more agile and their tools become more sophisticated, according to Radware. Their report …

Improving trust in web services

The EU’s cyber security Agency, ENISA, is publishing a series of new studies about the current security practices of Trust Service Providers (TSPs) and recommendations …

Fixing the Internet of Things

Calling all devices: We are Internet, Resistance is futile! I’ve been at this long enough to see the birth of the Internet, the current state of the Internet and the …

Penetration testing: Accurate or abused?

According to a recent Ponemon study, since 2010 cybercrime costs have climbed 78% and the time required to recover from a breach has increased 130%. On average, U.S. …

Best practices to help prevent online data breaches

The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the …

How to implement incident reporting in cloud computing

Cloud security incidents often catch the media’s attention as they affect large number of users. For example, recently a large storage service provider suffered an …

Key security program and budget data for CISOs

Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …

ENISA issues report on how to act after power cuts

EU cyber security Agency ENISA has issued a new report studying network outages caused by power cuts in detail, resulting in key findings and recommendations to the electronic …

Investigating Internet Crimes

Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through …

Top priorities for organisations to counter digital criminality

Martin Sutherland, Managing Director, BAE Systems Detica highlights that the single biggest issue that will hit organisations in 2014 will be the rise of digital criminality …

Microsoft releases BYOD best practices for enterprise workers

Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …

Don't miss

Cybersecurity news