Please turn on your JavaScript for this page to function normally.
Bringing networking and security together through network automation

The past ten years have seen a proliferation of increasingly complex network devices. Coupled with the recent rise in adoption of BYOD policies, mobile working practices, …

The CSO perspective on risk management

Candy Alexander is the CSO at Long Term Care Partners and volunteers as a member of the International Board of Directors for ISSA. In the past, she was invited to the White …

The importance of secure coding

Jim Manico is the VP of Security Architecture for WhiteHat Security. In this video recorded at Hack In The Box 2013 Amsterdam, Manico illustrates the importance of secure …

Why wiping decommissioned IT assets should be a must

Last week I’ve written about the ways confidential data can leak outside the organization if the IT security team doesn’t pay attention to printers, shredders, or …

Do young people care about privacy?

Everywhere I go, I hear some variation of the claim that “young people today just don’t care about privacy.” This is something that people widely seem to …

How do you protect yourself in the event of a data breach?

Identity Guard warns consumers to be aware of the increased risk of identity theft and provides tips on how they can help protect themselves from becoming a victim. In a …

Is your company ready for a big data breach?

Despite the majority of companies experiencing or anticipating significant cost and business disruption due to a material data breach, they still struggle to take the proper …

Twitter’s recipe for security awareness

Security awareness training is an issue that has been and continues to be hotly debated both online and offline. It is also a topic that seems a little out of place at the …

You’ve been hacked, now what?

Given the increased frequency and complexity of cyber attacks on business networks of all sizes, the odds of experiencing a breach is almost guaranteed if the right security …

A call to arms for infosec professionals

An old saying says “nature abhors a vacuum,” meaning that in the absence of something nature will find a way of filling that gap. We are currently witnessing the …

10 best practices for securing data in Hadoop

Dataguise released ten security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and …

Tips for securely using free Tube Wi-Fi

GFI Software warned of potential data and device security concerns posed by using London’s public Wi-Fi service, installed across large parts of the London Underground …

Don't miss

Cybersecurity news