Expert analysis
Responding to data breaches and increasing security
In this podcast, recorded at Infosecurity Europe 2014, Josie Herbert interviews Craig Carpenter, the Chief Cybersecurity Strategist for AccessData. Carpenter tackles the …
EU Data Protection Regulation: Detection is the best prevention
The UK government recently published guidelines for companies covering the five basic controls that businesses must follow to ensure a minimum level of protection. The goal of …
Infosecurity Europe 2014 showcase
Here’s a video overview of Infosecurity Europe 2014, that took place last week in London. For a roundup of news from the conference, including photo galleries, podcasts …
The Heartbleed effect
In this podcast, recorded at Infosecurity Europe 2014, Ivan Ristic, Director of Engineering at Qualys, talks about the Heartbleed bug and its impact on the security industry. …
Convergence of physical and cyber security
The concept of security convergence, where physical and cyber security issues overlap, has been around for more than a decade. But it has only been in the last few years that …
Guide to the UK government cyber essentials scheme
The results of the latest cyber threat reports and surveys have denominated 2013 as the year of major breaches. The media naturally focuses on the big stories of massive data …
How to learn information security
Learning is a skill. A skill that can be, well, learned. I am often approached by young people who ask me what does it take to move into the information security field, what …
Wearable technology privacy and security issues
In this interview, Dominic Storey, EMEA Technical Director at Cisco, talks about the security attacks wearable devices are susceptible to at the moment, how security should be …
Six infosec tips I learned from Game of Thrones
In Westeros—the land of dark knights, backstabbing royals, dragons, wildings, wargs, red witches, and White Walkers—even the youngest ones have to learn basic self-defense …
Passwords: Real-world issues, tips and alternatives
Per Thorsheim is an independent information security adviser based in Norway. He is the founder and main organizer of PasswordsCon, the first and only international conference …
Working to accomplish compliance and security
Organizations have until January 2015 to meet the new requirements of the PCI Data Security Standard version 3.0. Businesses need to ensure that compliance is cyclical and …
Hands on fun at HacKid 2014
Last weekend, families and tech industry leaders descended on The Tech Museum of innovation in San Jose, California, for HacKid 2014. We had a great turnout for the event …
Featured news
Resources
Don't miss
- RCE flaw in tool for building AI agents exploited by attackers (CVE-2025-3248)
- Exploited: Vulnerability in software for managing Samsung digital displays (CVE-2024-7399)
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks