Expert analysis
Privacy compliance laws: Why the European Commission finally got it right
The debate about privacy compliance has always been a heated one. Add to the mix new European Commission legislation and you have a recipe for not only a lively debate but …
How to get promoted in IT security
Not only has landing a job become more difficult; it’s also getting harder to get promoted once you have the job. Here are some tips to getting ahead in today’s …
Security implications of the rise of silicon-based life forms
Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …
Human generated big data
Human generated content is comprised of all the files and e-mails that we create every day, all the presentations, word processing documents, spread sheets, audio files and …
Cloud provider assurance: Trust but verify
Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and cloud privacy and compliance …
Voter database security is a myth
Some of us spend days and months of indecision, hours in front of the TV watching campaign commercials and presidential debates, researching on the Net, mulling the options …
Security as an enabler of innovation
For years, many enterprises have viewed IT security as a costly extra that has to be endured as a way to reduce risk, without providing any other value to the business. Recent …
Interesting times for information security professionals
There is an old saying, which some attribute as an old Chinese proverb, that states “May you live in interesting times.” Some say that this is a blessing you may …
Inside SANS London 2012
Matt Anderson is the Director, EMEA at SANS Institute. In this interview he talks about SANS London 2012, Europe’s biggest and most important information security …
5 bad things IT administrators do
Philip Lieberman is the President at Lieberman Software Corporation and in this video talks about five awful things that IT administrators do and offers ways to fix these actions.
Information-related risks, threats and compliance
Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is a member of the Commission on Cyber Security for the 44th President and several executive …
The QR code: A new frontier in mobile attackability
A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform