Expert analysis
Twenty five years of firewall innovation
When the internet was first launched on a mass scale back in the late 80s, it is understandable that the technology industry got more than a little excited – the way we …
Integrating IT security at the board level
2014 has seen an upsurge in public awareness of cybercrime, with a flurry of high-profile security breaches hitting the headlines. The sensationalised coverage of the …
Seven Destiny video game tactics that translate to cyber security
Why learn by grinding through dry security best practices when you can make education unique by mixing in a little geeky fun? In the third installment of my security pop …
How can parents keep their children safe on the Internet?
In today’s society, children are unquestionably more tech-savvy than ever before, with far greater access to gadgets and a veritable wealth of information at their …
How consumers foot the bill for data breaches
Data breaches are almost always expensive and somebody always ends up paying those expenses somewhere down the line. Either because they were affected directly and have no one …
Discover Cyber Security EXPO
In this interview, Mark Steel, CEO at IP EXPO Europe, talks about Cyber Security EXPO, taking place October 8-9 in London. This is the very first Cyber Security EXPO. How …
Modes of defense against security breaches in healthcare
It’s no secret that data security has serious implications for healthcare providers. A major breach can seriously undermine public trust – and result in hefty …
Password security is not just a user problem
When high profile password compromises occur, we often spend a lot of time focusing on advice to the users – “Use strong passwords;” “Don’t reuse …
Education is the key to increasing mobile security
The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …
How threats shape cloud usage
In this interview, Ravi Ithal, Chief Architect at Netskope, discusses the top threats to cloud security and how they are changing the way we’re using the cloud. He also …
We can fix security, but it’s not going to be easy
When I think about computer security, I like to go back to its early days and compare the situation then with the situation now. Taking a step back is very useful because, …
Behavioral analysis and information security
In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security, how behavioral analysis can …
Featured news
Resources
Don't miss
- ClickFix campaign delivers Mac malware via fake Apple page
- Poisoned “Office 365” search results lead to stolen paychecks
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)