Expert analysis
Unwrapping holiday gift card fraud
Spending on gift cards is expected to hit new highs this holiday season – the National Retail Federation predicts that gift card sales will reach almost $30 billion. …
Lessons learned from Anonymous and Operation Last Resort
Activists that have links to Anonymous were able to gain access to U.S. government computers through a software flaw on the outdated Adobe ColdFusion platform. This left many …
The true cost of cybercrime
From a cybercrime perspective, the opportunities are boundless: Seemingly everything has a computer in it, cars and pacemakers included. It’s almost certain that the …
How IT will transform business in 2014
Generally speaking, I’m not a big fan of predictions. I’ve never met anyone with a crystal ball that doesn’t work near a boardwalk or a table ensconced in …
Overcoming the data privacy obstacle to cloud based test and development
How many times have data security and privacy constraints brought your key application development initiatives to a screeching halt? It usually occurs right around the time …
Innovations that will shape network security
Headline after headline, some company reports a cyber incident and hangs its head in shame. While it is disappointing, strong businesses have strong leaders that show us how …
The enemy within
Recent high-profile cases in the press have called attention to the threat the trusted insider can pose to the security of an organization. A recent survey highlighted that …
Tracking botnets using automatically generated domains
Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security. Modern botnets rely on domain-generation algorithms (DGAs) to build …
A look at IT security health checks
Over the past few days, one thing got my attention which I think in many ways sums up the state of our industry. While on a shopping trip with my wife, she noticed a billboard …
Why cybercriminals want your personal data
Over the past few years, the personal data theft landscape has changed as online behaviors and activities evolve. Online shopping is more popular than ever, businesses are …
7 must-have technical security controls for any budget
Prioritizing items on a security budget can be difficult. Here’s seven key technical controls every IT shop should include in a security budget. 1. Perimeters defenses …
How to address the main concerns with ISO 27001 implementation
Recently I delivered two webinars on the topic of ISO 27001, and I have asked the attendees to send me their top concerns regarding ISO 27001 implementation before those …
Featured news
Resources
Don't miss
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed