Expert analysis
Fixing the Internet of Things
Calling all devices: We are Internet, Resistance is futile! I’ve been at this long enough to see the birth of the Internet, the current state of the Internet and the …
Penetration testing: Accurate or abused?
According to a recent Ponemon study, since 2010 cybercrime costs have climbed 78% and the time required to recover from a breach has increased 130%. On average, U.S. …
The biggest challenge to IT security is marketing
Most companies today are using social media and online marketing channels to tell their customers and prospects about what they do. From company Twitter accounts, LinkedIn …
The futility of all vendor predictions
As the New Year starts, many people look forward to what it will bring, and for many this involves looking at upcoming budgets and deciding on what to spend the money …
The growing hacking threat to e-commerce websites, part 2
In the first part of my article, I briefly revised attackers’ motivations to compromise your website. In this part, I will discuss how websites get hacked, how you can …
BYOD and biometrics in the enterprise – ally or enemy?
BYOD continues its victory march as the enabler of choice among employees juggling increasingly intertwined home and work lives – for IT managers however it is the stuff …
Four reasons why audits matter
We live in a world where assurance is a precious commodity. People with bad intentions are getting smarter every day as evidenced by the recent compromise of nearly 40 million …
How have consumer attitudes changed towards data security?
Over the last few years, data has become non-exclusive; with the information consumers create and leave behind now the stuff of headlines and documentaries. From swiping a …
Breaking the backlog of digital forensic evidence
It is time for a change in the way the law enforcement works with digital forensic evidence. Every police investigator needs to be able to quickly and easily analyze digital …
Lessons learned in password security 2013
As 2013 comes to a close, it’s time to reflect on a year of change for password security and the implications for the year ahead. Large scale security breaches this year …
What are the building blocks of security culture?
In order to understand how to create security culture, it is important to know what it is and how we define it, so that we can look beyond the basics. Taking into …
Teaching children information security skills
In this interview, Julie Peeler, the Director of the (ISC)2 Foundation, discusses the biggest online threats to kids and provides tips on how to teach children to stay safe …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month