In time for the busiest shopping and travel (and probably overall credit card use) time of the year, we are seeing a number of new Point-of-Sale (PoS) malware and PoS-related breaches. More >
With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks. More >
Restoration and resolution are only the tip of the major incident communication iceberg. Really effective major incident communication reaches out to a host of other people inside and outside the organization. More >
If friendly hackers discovered vulnerabilities, how does that information mesh with behavior analytics as a way to add another layer to security detection and prevention? More >
So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. More >
News this week included smart lightpoles, 5G, bad news for municipal broadband, the scary side of the IoT, and licensed and unlicensed spectrum issues. More >
Wolfram Jost, chief technology officer at the German enterprise software giant, Software AG, shares candid thoughts on security, software and the coming age of platforms.More >
As the HR director for a data loss prevention company, Jacqui Summons has learned a thing or two about how HR and IT need to interact for the best data security outcome.More >
A spokesperson from Kromtech Alliance explains how MacKeeper ended up with a tarnished reputation and what the company is doing to fix it.More >
Cybersecurity Ventures recently announced their Q4 2015 Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year.
The amount of new ground that needs to be broken in order to bring the IoT from the test bed to full production environments is substantial, more so than virtually every other technology initiative we’ve seen so far.
CES recently announced the honorees for its 2016 Best of Innovation award, a yearly competition that seeks out the best designs and engineering advancements in technology products.
Email is an integral part of working, but for far too many workers, it hurts rather than helps their productivity.More >
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also expl...
This publication assists organizations in understanding the basics of SSH interactive and automated access management in a...
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay o...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...