Who should be responsible for protecting your online privacy?
Just in time for Data Privacy Day, Microsoft has released the results of a survey that shows the privacy attitudes of technology savvy individuals in the US and four European …
DDoS attacks become smarter, faster and more severe
DDoS attacks will continue to be a serious issue in 2014 – as attackers become more agile and their tools become more sophisticated, according to Radware. Their report …
Improving trust in web services
The EU’s cyber security Agency, ENISA, is publishing a series of new studies about the current security practices of Trust Service Providers (TSPs) and recommendations …
Fixing the Internet of Things
Calling all devices: We are Internet, Resistance is futile! I’ve been at this long enough to see the birth of the Internet, the current state of the Internet and the …
Penetration testing: Accurate or abused?
According to a recent Ponemon study, since 2010 cybercrime costs have climbed 78% and the time required to recover from a breach has increased 130%. On average, U.S. …
Best practices to help prevent online data breaches
The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the …
How to implement incident reporting in cloud computing
Cloud security incidents often catch the media’s attention as they affect large number of users. For example, recently a large storage service provider suffered an …
Key security program and budget data for CISOs
Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …
ENISA issues report on how to act after power cuts
EU cyber security Agency ENISA has issued a new report studying network outages caused by power cuts in detail, resulting in key findings and recommendations to the electronic …
Investigating Internet Crimes
Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through …
Top priorities for organisations to counter digital criminality
Martin Sutherland, Managing Director, BAE Systems Detica highlights that the single biggest issue that will hit organisations in 2014 will be the rise of digital criminality …
Microsoft releases BYOD best practices for enterprise workers
Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do