Expert analysis
Exploring data center design innovations
Douglas Alger is Cisco’s IT Architect for Physical Infrastructure. He develops architecture roadmaps, solutions and policies for the physical infrastructure of the …
Get ready for invited break-ins, malware-ridden apps and spoof attacks
It’s that time of year again when, it seems, every technology vendor suddenly becomes clairvoyant with an insatiable urge to predict the battles we need to arm ourselves …
Improving information security with one simple question
Anyone who has children, or has had to deal with very young children, will understand how powerful the word “why” is and how it can drive their curiosity. …
Password handling: challenges, costs, and current behavior
Online passwords are a pain, and not just when you have to type them to access your online bank account or shop at your favorite digital emporium. Password pain extends to the …
Staying safe if your IT security budget gets cut
As companies continue to struggle in today’s difficult economy, cutbacks affect all sectors of organizations. Unfortunately, IT security solutions are often not spared …
Generation Tech: Gifted but a long way from bad
They have been described as technology’s Generation Y or Generation Tech: an undisciplined, impulsive, entitled horde of twenty-something workers, seen as one of the …
When will the public sector grasp basic lessons on information security?
Another day, another public sector data breach. Last month the ICO fined Greater Manchester Police £120,000 for the loss of a USB stick. The month before, the Scottish …
Can you trust the cloud?
Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that cloud security issues (84.4%) and cloud privacy and compliance issues …
How to stay secure in a changing world
In Sir Isaac Newton’s time there were three laws of motion, which dominated the scientific view of the world. While he, and his scientific peers, might have had many …
Privacy compliance laws: Why the European Commission finally got it right
The debate about privacy compliance has always been a heated one. Add to the mix new European Commission legislation and you have a recipe for not only a lively debate but …
How to get promoted in IT security
Not only has landing a job become more difficult; it’s also getting harder to get promoted once you have the job. Here are some tips to getting ahead in today’s …
Security implications of the rise of silicon-based life forms
Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …
Featured news
Resources
Don't miss
- How CISOs can talk cybersecurity so it makes sense to executives
- How OSINT supports financial crime investigations
- Review: Effective Vulnerability Management
- Vuls: Open-source agentless vulnerability scanner
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)