Please turn on your JavaScript for this page to function normally.
5 mobile app security tips

ICSA Labs released a list of 5 mobile app security tips to help enterprises protect their data. 1. Dynamic analysis is a must. If deploying security tested mobile applications …

Top 12 scams of the holiday season

McAfee released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season to take …

7 must-have technical security controls for any budget

Prioritizing items on a security budget can be difficult. Here’s seven key technical controls every IT shop should include in a security budget. 1. Perimeters defenses …

Free eBook: 9 Steps to Cybersecurity

9 Steps to Cybersecurity from expert Dejan Kosutic is a free e-book designed specifically to take you through cybersecurity basics. Aimed at people with limited prior …

Hypervisor-based, hardware-assisted system monitoring

In the last few years, many different techniques have been introduced to analyse malicious binary executables. Most of these techniques take advantage of Virtual Machine …

How to address the main concerns with ISO 27001 implementation

Recently I delivered two webinars on the topic of ISO 27001, and I have asked the attendees to send me their top concerns regarding ISO 27001 implementation before those …

Tips for protecting your personal and business data

As the risk of security breaches continues to become more prevalent, it is increasingly important that consumers and organizations protect their confidential information. …

A primer on breaking game console security

Are you interested to learn about the delicate hacks and tricks that go on behind the curtains of the scene better known as the console hacking scene? In this podcast recorded …

Five keys to small business cyber safety

According to The Ponemon Institute, 55 percent of small businesses experienced at least one data breach in 2012 and 53 percent had multiple breaches. Yet, a recent study by …

ISO 27001 standard benefits, implementation tips and security controls

Dejan Kosutic is an expert in information security management and business continuity management. In this interview he talks about the key changes in the ISO 27001: 2013 …

Characteristics of effective security leaders

A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …

What has changed in ISO 27001?

Learn what has changed in ISO 27001 using this easy to understand infographic, click the image to get the complete version: The key differences are detailed including: Most …

Don't miss

Cybersecurity news