How apps and extensions affect your browsing
Google has announced the newest version of the Chrome Apps & Extensions Developer Tool, which helps developers debug apps and extensions, and power users to see which …
Is your data already out there?
CIOs cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors, …
How the cloud can be used and misused
Peter Jopling, CTO and Software Security Executive, IBM UK & Ireland, talks about threats to cloud infrastructure providers, the importance of real-time data analytics, …
Breakdown of traditional security models and strategies
Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to …
Five ways to avoid costly compliance risks
When it comes to violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules, the stakes can be high. Recently, the New York …
Identify stolen credentials to improve security intelligence
Data is the heart of an organization, and IT security teams are its protectors. Businesses spend billions of dollars per year setting up fortresses to safeguard data from …
Set up email encryption in half an hour
As part of the global Reset the Net action, the Free Software Foundation, a non-profit organization that promotes computer user freedom and aims to defend the rights of all …
The disruption of Cryptolocker and GameoverZeus
Part of the difficulty in unraveling ZeuS botnet infrastructure is mapping it out. Attackers usually plant a generic dropper within an emailed file, disguised to look like a …
Improving training programs in cyber security
In this podcast, recorded at Hack In The Box Amsterdam 2014, Lisha Sterling, Developer Coordinator at Geeks Without Bounds, talks about the problems in cybersecurity …
Introducing the Security Culture Summer School
The infosec community has complained about awareness training failures and wasting time and effort on awareness trainings for quite some time. A consensus has emerged that for …
What inspired you to start hacking?
This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …
Keeping your data secure while on the move
John Michael is the CEO at iStorage, a provider of secure portable data storage. In this interview he discusses the often overlooked repercussions of data loss, offers tips …
Featured news
Resources
Don't miss
- Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO
- LLMs at the edge: Rethinking how IoT devices talk and act
- How to build a secure AI culture without shutting people down
- ScreenConnect admins targeted with spoofed login alerts
- Fake macOS help sites push Shamos infostealer via ClickFix technique