Characteristics of effective security leaders
A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …
Traditional security models becoming exhausted
The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information. Gartner predicts …
Protect data before sending it to the cloud
IBM inventors have developed a technique for protecting sensitive data prior to transmitting it to the cloud. The patented invention will overcome barriers to client adoption …
IPS still mainly deployed at the perimeter, doing a good job
SANS announced the results of a new survey on network security sponsored by HP. 439 survey responses show that IPS is still mainly deployed at the perimeter and is doing a …
Week in review: PHP.net compromise, Facebook data mining, and how to social engineer a social network
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: The Basics of Web Hacking: Tools and Techniques to Attack the Web …
Bypassing security scanners by changing the system language
A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that a computer system can be set up to …
WordPress 3.7 delivers important architectural updates
WordPress 3.7, named Basie, is available for download or update in your WordPress dashboard. Updates include: Updates while you sleep: With WordPress 3.7, you don’t have …
Mozilla releases add-on to reveal online data tracking
With a new version (1.0.2) released on Wednesday, Mozilla has once again put the spotlight on its Collusion add-on that aims to show users which first and third parties are …
PHP.net compromised to serve malware
On Thursday, Google’s Safe Browsing service began warning visitors to php.net that the website was discovered serving malware. Initially, most people and PHP maintainers …
Cloud strategies and adoption
The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend, according to Gartner. 2016 will be a defining year for cloud …
Exploring the dangers of a mobile lifestyle
We live in an increasingly digital world, and rely on the devices we use to store our more or less valuable information and to perform critical tasks. In fact, according to a …
Insider threat: Users are out of control
Employees are granted excessive privileges and access for their particular roles resulting in unnecessary risks to organizations. One of the most startling statistics from a …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous