New expert-level cyber forensics certification
(ISC)2 has developed a new certification, the Certified Cyber Forensics Professional (CCFPSM), as the first global standard for assessing experienced digital forensics …
Microsoft Citadel takedown ultimately counterproductive
Last week’s disruption of nearly 1500 Citadel botnets believed to be responsible for over half a billion US dollars in financial fraud and affecting more than five …
Dell adds identity to the classification of unstructured data
Dell Software released Dell Quest One Identity Manager – Data Governance Edition Classification Module, the latest solution that adds identity to the classification of …
Week in review: NSA spying scandal, EU net neutrality, and vulnerable smart TVs
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: Google won’t allow facial recognition on Glass Whether …
Proposed bill will deny foreign hackers entry into the U.S.
A day before U.S. President’s scheduled meeting with Chinese President Xi Jinping, a new act that aims to punish criminals engaging in cyber spying and theft on behalf …
New Android Trojan is complex as Windows malware
Mobile (and especially Android) malware is on the rise and according to researchers from Kaspersky Lab, its complexity is also increasing. Case in point: …
Google ups (some) bug bounties
Google has once again decided to raise the sums that researchers can earn by offering information about bugs in the company’s web services and properties (YouTube, …
Changes to the standard for PIN Transaction Security
Today the PCI Security Standards Council (PCI SSC) published version 4.0 of the PIN Transaction Security (PTS) Point of Interaction (POI) requirements. These requirements, …
Pirate Bay founder suspected of hacking police databases
Pirate Bay co-founder Gottfrid Svartholm, who has been extradited from Cambodia to Sweden to answer for allegedly hacking of Swedish IT company Logica and the Nordea bank …
NSA has direct access to Google, Facebook, Apple servers
After yesterday’s news that Verizon is compelled to share all phone call metadata with the NSA on a daily basis comes the incendiary revelation that the spy agency has …
What are users doing after log-in?
Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and …
Backup and recovery problems exposed
A Veeam survey of 500 SMBs across the USA and Europe found that they are experiencing significant issues with the cost, complexity and lack of capabilities of their data …
Featured news
Resources
Don't miss
- Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)
- How to land your first job in cybersecurity
- World Health Organization CISO on securing global health emergencies
- Calico: Open-source solution for Kubernetes networking, security, and observability
- Cyber turbulence ahead as airlines strap in for a security crisis