Privacy, The Feds and Government Surveillance - RSA and Spiceworks Survey Results

March 15, 2016 | Javvad Malik

We recently ran two user surveys concurrently at RSA 2016 in San Francisco as ...

5 Security Things to Know for the Week of March 14

March 14, 2016 | Dan Kaplan

1. Watch a credit card thief take mere seconds to clandestinely attach a ...

Hawaii Businesses Turn to Hawaiian Telcom for Network Security and Compliance Concerns

March 14, 2016 | James Fritz

For this article, I sat down with Matt Freeman, Senior Manager, IP & ...

One Change to Improve Security

March 11, 2016 | Javvad Malik

One of the best things about being at RSA last week was the opportunity to meet ...

One Change to Improve Security

March 11, 2016 | Javvad Malik

One of the best things about being at RSA last week was the opportunity to meet ...

Shadyware - Fuzzy and Grey like a Cat, not a PUP

March 09, 2016 | Eric Rand

I’d like to pose a question: What's the difference between malware and ...

How Hackers Are Hitting Finance – And What You Can Do About It

March 08, 2016 | Jane Dotsenko

December's edition of a twice-annual report that assesses financial stability ...

RSA Conference 2016: Security by cyber...or lightsaber

March 08, 2016 | Dan Kaplan

We came, we saw, we conquered.

5 Security Things to Know for the Week of March 7

March 07, 2016 | Dan Kaplan

1. For the first time, Mac users are feeling the threat of ransomware thanks to ...

RSA Conference 2016: The Value of Security Awareness Education

March 07, 2016 | Dan Kaplan

As companies ingest more malware and targeted attacks than ever before, ...

Seven Alien Highlights From RSA 2016

March 04, 2016 | Javvad Malik

At RSA 2016, AlienVault descended on the Moscone Center with its glowing ...

Writing Risk Statements in Infosec

March 03, 2016 | Javvad Malik

How Hackers Can Communicate Like a Hack You're a security professional. Many of ...

How to Pick a Threat Intelligence Vendor: an Interview with Russ Spitler

February 29, 2016 | Kate Brew

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...

In the Insurance Industry, With Big Data Comes Big Responsibility

February 25, 2016 | Jane Dotsenko

As any insurer can tell you: The more information you have about a risk, the ...

5 Security Things to Know for the Week of Feb. 22

February 23, 2016 | Dan Kaplan

1. This Q&A likely answers many of the questions you have regarding Apple's ...

When Infosec Is Life or Death - Ransomware Hits a Hospital

February 23, 2016 | Patrick Bedwell

A hospital in Southern California made news last week after being the victim of ...

Don't Get Yourself In A Pickle at RSA 2016

February 22, 2016 | Holly Barker

It's "RSA time" again for all of the infosec professionals out there! RSA ...

Technical Training in Europe – How is it Different?

February 18, 2016 | Kate Brew

I had the opportunity to interview John Ó Ríordán, Senior Technical Trainer for ...

The Cybersecurity Skills Crisis in Numbers

February 16, 2016 | Admin

Too many threats… too few professionals. That's the key point an ISACA ...

7 Cyber Security Movies That Need to Be Made

February 12, 2016 | Javvad Malik

Our recent tweet chat on pop culture got a lot of people talking.

Underground: Scarlet Mimic Espionage Campaign

February 11, 2016 | Patrick Bedwell

Most high profile data breaches we have read about recently include credit card ...

Why Cybersecurity in the Hotel Industry Should be a Joint Effort

February 10, 2016 | Jane Dotsenko

Recent cybercrime headlines in the hospitality industry should make for ...

Introducing the 2016 Security Pressures Report from Trustwave

February 10, 2016 | Dan Kaplan

Routine is not in the vocabulary of an IT security professional. Each and every ...

5 Security Things to Know for the Week of Feb. 8

February 08, 2016 | Dan Kaplan

1. Oracle announced that its Java plug-in is going away, a move that security ...

Yet Another Random Password Generator (YARPG) – a Python Tool

February 08, 2016 | Anne Henmi

Password.

5 Security Things to Know for the Week of Feb. 1

February 01, 2016 | Dan Kaplan

1. Cybercrooks are producing new strains of malware at record rates.

The 7 Strangest Places People Have Lost Data

January 28, 2016 | Javvad Malik

Each January 28th, we celebrate International Data Privacy Day. Around this ...

Where Should Finance Companies Invest Their Security Budgets in 2016?

January 27, 2016 | Jane Dotsenko

As the world of finance looks back on a rough year of cybercrime in 2015, it is ...