Please turn on your JavaScript for this page to function normally.
Security intelligence through configuration auditing

Modern systems have a multitude of configuration elements that, ideally, meet the IT business requirements of the organization. The danger of having poorly configured systems …

Defending against the BREACH attack

When Juliano and Thai disclosed the CRIME attack last year, it was clear that the same attack technique could be applied to any other compressed data, and compressed response …

Working as an ethical hacker

The term “ethical hacker” as it is used today is, if you ask me, somewhat imprecise. After all, a hacker in it for the money could be said to follow his or her own …

How to avoid digital dangers while traveling

It’s summer holiday season, when people pack up their smartphones and tablets, sunscreen and tank tops and set off for a change of pace. With connected devices …

Real-time data analysis increases DDoS defenses

Real-time analytics are a powerful tool for identifying denial of service attacks and other cyber threats, risks and events. Prolexic recommends that the information gleaned …

Keep your laptop safe while using Wi-Fi hotspots

The relaxing atmosphere of surfing at the beach makes it easy to forget about the sharks. Connecting to an unsecured network poses serious risks to your laptop and data. In a …

How to spot and avoid SMS scams

2013 has been touted by Gartner as the year when mobile phones will overtake PCs as the most common Web access device worldwide. When you think about it, it’s logical, …

Cloud Computing: Theory and Practice

Once a buzzword, cloud computing is now a part of nearly every modern IT infrastructure. Despite a variety of privacy, security and compliance concerns, companies large and …

To achieve good security, you need to focus on business

In September 2001, as the Nimda computer worm devastated networks worldwide, we in IT security thought that the management will finally wake up and see how important it was to …

The scary implications of Google Glass

Google Glass, for all its promise, has some scary implications. Here is my list of potential challenges we face with Glass: User experience Social awkwardness Privacy (or lack …

Don’t get pwned at Black Hat, DEF CON

I am not a paranoid person and most industry conferences I go to don’t generate any worries about security. You go and participate, but otherwise operate normally, …

Metrics: Valuable security indicator or noise?

Many organizations believe that IT, and by association IT security, is a wasted expense. They recognize that the financial investment needs to be made but few truly understand …

Don't miss

Cybersecurity news