Expert analysis
Defeating Magento security mechanisms: Attacks used in the real world
DefenseCode recently discovered and reported multiple stored cross-site scripting and cross-site request forgery vulnerabilities in Magento 1 and 2 which will be addressed in …
Three cybersecurity threat trends that organizations should address today
The cybersecurity landscape grows seemingly more complex – and dangerous – by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on …
Making security everybody’s business goes beyond strong passwords
One of my colleagues recently shared a story that unfortunately, is not an uncommon happening among line of business application owners. He was monitoring a high value …
Battling cyber security’s human condition
There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even …
Data security and mobile devices: How to make it work
There has been a lot of hype in the media about messaging tools. But recently, some of the headlines have taken a negative turn. Just last month, we read how a London-based …
Know your enemy: Defining the new taxonomy of malicious emails
Just as it is the default tool for most businesses, email’s capacity for rapid, mass communication has made it a favourite instrument of criminals. As a result, malicious …
Behavioural profiling: Spotting the signs of cyber attacks and misuse
Behavioural profiling is increasingly recognised as a new level of protection against cyber attacks and systems abuse, offering the potential to pick out new and unknown …
An untold cost of ransomware: It will change how you operate
Ransomware is unfortunately an IT reality. With the complexity and frequency of attacks, there is a good chance you or someone you know has been impacted. Many victims …
Security and the human factor: Creating a positive user experience
Despite the myriad of security solutions deployed, breaches are still happening. Even with the most robust security solutions it seems that we’re failing with the …
Will blockchain liability be similar to Bitcoin liability?
For many, Bitcoin is the de facto face of blockchain. The cryptocurrency Bitcoin has gained a sullied reputation for its nefarious use in criminal or black market …
Cloud-based single sign-on means access and security everywhere
The cloud is now the standard of corporate organizational life. It is a standard practice for nearly every sector of every industry. So, there must be solutions available to …
Evolution of security operations from reactionary survival mode to forced sophistication
The most security-sensitive companies approach their job and their day with the default assumption that they have been hacked, and they set out to prove that important …
Featured news
Resources
Don't miss
- The breaches everyone gets hit by (and how to stop them)
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about