Expert analysis
How to keep your contactless payments secure
Contactless transactions – ranging from access control and ticketing to financial payments – emerged almost two decades ago and, since then, have become widely …
Security compliance is necessary for real-time mobile data access
Security compliance often varies from organisation to organisation due to varied industry regulation as well as internal security policies and procedures. We often see …
How to talk infosec with kids
As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you’re a parent, like …
Bug bounty programs: The road to hell is paved with good intentions
Bug bounties are in the news again. Twitter has announced its own new scheme, while Robert Graham of Errata Security claims legal actions brought for loss of personal data …
Emerging cloud threats and how to address them
As organizations deploy and harness private, community and hybrid clouds, they encounter new types of threats, along with the old ones they’ve been battling for years. …
Securing virtual machines: Considerations for the hybrid cloud
With enterprises’ growing interest in adopting the hybrid cloud, Cloud Service Providers (CSPs) want to develop premium cloud offerings that fuel the rate of this …
Are free file storage solutions a safe bet for businesses?
The benefits of cloud computing are becoming increasingly recognized, and with this heightened understanding comes growing numbers of UK businesses that are embracing the use …
Apple built multi-factor authenticated payment in the right order
As an American living in Europe I have been perplexed at multi-factor authentication for payments. The Americans (laggards in my opinion) have been using magnetic stripe cards …
5 key things to consider when developing an enterprise mobility management strategy
To state the obvious, business success today is dependent on an organization’s ability to empower its mobile workforce. Corporate resources – including …
Why open source and collaboration are the future of security
In this podcast recorded at Black Hat USA 2014, Greg Martin, CTO at ThreatStream, talks about why open source and collaboration are the key drivers of information security …
Mobile forensics in a connected world
In this interview, Andrew Hoog, CEO of viaForensics, talks about the forensic examination of mobile devices, the challenges involved with testifying at trials, and offers …
Malicious and risky apps on Android and iOS
Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc. In this podcast recorded at Black Hat …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!