Please turn on your JavaScript for this page to function normally.
Is your company ready for a big data breach?

Despite the majority of companies experiencing or anticipating significant cost and business disruption due to a material data breach, they still struggle to take the proper …

Twitter’s recipe for security awareness

Security awareness training is an issue that has been and continues to be hotly debated both online and offline. It is also a topic that seems a little out of place at the …

You’ve been hacked, now what?

Given the increased frequency and complexity of cyber attacks on business networks of all sizes, the odds of experiencing a breach is almost guaranteed if the right security …

A call to arms for infosec professionals

An old saying says “nature abhors a vacuum,” meaning that in the absence of something nature will find a way of filling that gap. We are currently witnessing the …

10 best practices for securing data in Hadoop

Dataguise released ten security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and …

Tips for securely using free Tube Wi-Fi

GFI Software warned of potential data and device security concerns posed by using London’s public Wi-Fi service, installed across large parts of the London Underground …

My very own personal privacy training

I remember a time – and it wasn’t even that long ago – when the government, companies and organizations weren’t this hell-bent on collecting citizen, …

DIY: Using trust to secure embedded projects

This talk from Shmoocon 2013 provides a DIY guide to using Trusted Computing on embedded devices. The authors introduce a low-cost schematic using Atmel’s CryptoModule …

Tips for avoiding tax scams

As the April 15 deadline for tax filing draws near, the Center for Internet Security (CIS) helps users recognize tax-related scams and better defend against them. Findings …

Blocking zero-day application exploits: A new approach for APT prevention

Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. The recently discovered advanced persistent …

Defending the Internet at scale

A decade ago, engineers tackled the C10K scalability problems that prevented servers from handling more than 10,000 concurrent connections. This problem was solved by fixing …

Armor for your Android apps

This defensive security talk from Shmoocon 2013 is primarily targeted towards Android developers. The speaker shares “war stories” of Android vulnerabilities and …

Don't miss

Cybersecurity news