Expert analysis
The time for responsible reporting has come
The beginning of the year is when budgets for the forthcoming year are made available, when many new projects are teed off, and the security conference season starts. It is …
Security awareness training: Why it matters
Dr. Peter Lokhorst is Managing Director of InfoSecure BV, which is currently in seven countries and provides awareness training programs to international clients including …
Doing more to protect your DNS from DDoS
According to a recent Arbor Networks report on infrastructure security, the number of DDoS attacks on enterprise DNS servers is on the rise but, despite this, many businesses …
Tips for handling your first security breach
When it comes to data breaches, the risk for organizations is higher than ever before – from the calculable costs of leaked data to the less tangible effects on the …
Top ten points in the fight against cybercrime
At a summit of regulators and intelligence chiefs yesterday, the business secretary, Vince Cable, issued a timely warning to all in attendance of the vulnerability of …
Five lessons we can learn from financial services and compliance
Banks and financial services organisations have been a prime target for hackers for a very long time, and as a result of this the industry has had to adhere to security …
Defending against drive-by downloads
In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …
Why governance and policy can strengthen compliance efforts
A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …
Data mining the future with security predictions
It has become somewhat of a tradition for information security vendors to pull out their crystal balls at the end of each year and do their best to predict interesting …
Smartphone spying: How can users protect themselves?
Smartphone users need to realise that their mobile phone is less of a phone and more of a mobile computer, in which applications can collect data from other applications …
Empowering users to make informed decisions on the value of sensitive data
Awareness days are a great way to raise the profile of important issues that might otherwise go unnoticed and Data Privacy Day is no different. Held annually on January 28, …
Fixing the Internet of Things
Calling all devices: We are Internet, Resistance is futile! I’ve been at this long enough to see the birth of the Internet, the current state of the Internet and the …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware