Expert analysis
Identity theft consequences and tips to stay secure
In this interview, Tom Feige, CEO of idRADAR, shares alarming identity theft stories, explains the consequences of getting your identity stolen, offers advice to organizations …
Authorization model for home automation
Smartphones promise to play an important role in the management and control of Home Automation (HA) solutions. When things and devices have either no or a constrained user …
Five steps towards cyber breach preparation
Earlier this week, Domino’s Pizza became the latest victim of a breach and ransom demand. Recent DDoS attacks on Evernote and Feedly DDoS, along with the efforts of …
A new defense against kernel-mode exploits
Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code …
Being a CISO at a higher education institution
In this interview, Matt Santill, CISO of Broward College, talks about the requirements and peculiarities of his job, the technologies the college uses to make its network …
600,000 customer details compromised at Domino’s
Today’s news that 600,000 customer records have been stolen from Domino’s France and Belgium yet again raises questions about just how seriously large corporations …
Five great computer security tips that few people follow
If you’re an infosec professional, you probably know a ton of security tips and best practices; use a firewall, update antivirus, patch regularly, adhere to the least …
Mobile security risks and challenges
Nat Kausik, the CEO at Bitglass, offers advice to organizations moving to an increasingly mobile workforce and discusses the most common mobile security pitfalls. Some …
The state of GRX security
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has mounted a successful attack against Belgacom (the largest telecom …
Authentication innovation, identity and credential management
In this interview, Richard Parris, CEO of Intercede, talks about how the digital world has shaped our identity, the main catalyst behind authentication innovation as well as …
Google End-to-End: The encryption silver bullet?
The world seems to be turning its attention to the notion of data encryption, and Google is the latest to jump on the bandwagon. On June 3rd, Google announced that it would be …
How the cloud can be used and misused
Peter Jopling, CTO and Software Security Executive, IBM UK & Ireland, talks about threats to cloud infrastructure providers, the importance of real-time data analytics, …
Featured news
Resources
Don't miss
- Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable
- Rethinking AppSec: How DevOps, containers, and serverless are changing the rules
- Autorize: Burp Suite extension for automatic authorization enforcement detection
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)