Business
Cloud
Ecommerce
Enterprise
Mobile
Security
Reviews
Videos
News
Submit
POPULAR ARTICLES
24 HOURS
7 DAYS
30 DAYS
ALL TIME
Security
The Digital Gold Rush: The Dark Side Of Cryptocurrency Adds To The Infosec Challenge
As the general public tried to get its head around the concept of cryptocurrency and blockchain at the back-end of 2...
The Digital Gold Rush: The Dark Side Of Cryptocurrency Adds To The Infosec Challenge
Security
Choose Action Over Panic
This week, the UK's National Cyber Security Centre (NCSC), the FBI and the U.S. Department of Homeland Security issu...
Choose Action Over Panic
Security
Top 5 Security Predictions For 2012
Although it's been 23 years since the first worm – the Morris worm – appeared on November 2, 1988, a lot more ha...
Top 5 Security Predictions For 2012
Security
5 Ways To Protect Your Company’s Hashtags
Hashtags are a great way to promote your brand on social media. They create buzz, help fans follow your company's acti...
5 Ways To Protect Your Company’s Hashtags
Security
Sophos And Bit.ly: Making Short Links Safer
Here's some good news if you're one of the millions of people who have come to depend upon shortened urls in your da...
Sophos And Bit.ly: Making Short Links Safer
Security
5 Reasons To Use Role-Based Access Control (RBAC)
Role-based access control (RBAC) allows organisations to restrict access to certain systems, allowing only certain a...
5 Reasons To Use Role-Based Access Control (RBAC)
Security
RAT Gone Rogue: Meet ARS VBS Loader
Malicious VBScript has long been a fixture of spam and phishing campaigns, but until recently its functionality has ...
RAT Gone Rogue: Meet ARS VBS Loader
Security
6 Reasons Every Business Needs A Network Vulnerability Scanner
Large or small, publicly traded megacorp or sole-proprietorship, if your business has computers, you need a network ...
6 Reasons Every Business Needs A Network Vulnerability Scanner
Security
2012 Cyber Security Predictions
With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012? I asked the...
2012 Cyber Security Predictions
Security
Everything You Need To Know About Hypervisor Attacks
I mentioned in one of my previous blog posts that the number one argument against cloud adoption is that of data secur...
Everything You Need To Know About Hypervisor Attacks
Security
5 Ways To Protect Your Company’s Hashtags
Hashtags are a great way to promote your brand on social media. They create buzz, help fans follow your company's acti...
5 Ways To Protect Your Company’s Hashtags
Security
Top 5 Security Predictions For 2012
Although it's been 23 years since the first worm – the Morris worm – appeared on November 2, 1988, a lot more ha...
Top 5 Security Predictions For 2012
Security
RAT Gone Rogue: Meet ARS VBS Loader
Malicious VBScript has long been a fixture of spam and phishing campaigns, but until recently its functionality has ...
RAT Gone Rogue: Meet ARS VBS Loader
Security
The Digital Gold Rush: The Dark Side Of Cryptocurrency Adds To The Infosec Challenge
As the general public tried to get its head around the concept of cryptocurrency and blockchain at the back-end of 2...
The Digital Gold Rush: The Dark Side Of Cryptocurrency Adds To The Infosec Challenge
Security
Choose Action Over Panic
This week, the UK's National Cyber Security Centre (NCSC), the FBI and the U.S. Department of Homeland Security issu...
Choose Action Over Panic
Security
Top 5 Network Security Trends For 2018
2017 has been a big year for network security. We had major cyber-attacks that took some business' offline for weeks...
Top 5 Network Security Trends For 2018
Security
5 Reasons To Use Role-Based Access Control (RBAC)
Role-based access control (RBAC) allows organisations to restrict access to certain systems, allowing only certain a...
5 Reasons To Use Role-Based Access Control (RBAC)
Security
Sophos And Bit.ly: Making Short Links Safer
Here's some good news if you're one of the millions of people who have come to depend upon shortened urls in your da...
Sophos And Bit.ly: Making Short Links Safer
Security
Top 3 Pressing Cyber Threats For IoT In 2018
Every year we see new pressing cyber threats, from new targets for hackers to new issues cropping up in the cybersec...
Top 3 Pressing Cyber Threats For IoT In 2018
Security
The Business Risk Of Removable Media
Many businesses use removable media devices as a quick and easy means of data storage and transfer. The nature of re...
The Business Risk Of Removable Media
Security
Top 5 Security Predictions For 2012
Although it's been 23 years since the first worm – the Morris worm – appeared on November 2, 1988, a lot more ha...
Top 5 Security Predictions For 2012
Security
Cyber Security And Why Law Firms Should Care
Cyber criminals are opportunists and the legal sector can provide exactly what they are looking to take advantage of...
Cyber Security And Why Law Firms Should Care
Security
Top 5 Network Security Trends For 2018
2017 has been a big year for network security. We had major cyber-attacks that took some business' offline for weeks...
Top 5 Network Security Trends For 2018
Security
Everything You Need To Know About Hypervisor Attacks
I mentioned in one of my previous blog posts that the number one argument against cloud adoption is that of data secur...
Everything You Need To Know About Hypervisor Attacks
Security
Oopsy DDoSy: Accidental DDoS Attacks Causing Major Grief
Even in these tumultuous times of omnipresent DDoS threats, you may have found a way to convince yourself that your ...
Oopsy DDoSy: Accidental DDoS Attacks Causing Major Grief
Security
5 Ways To Protect Your Company’s Hashtags
Hashtags are a great way to promote your brand on social media. They create buzz, help fans follow your company's acti...
5 Ways To Protect Your Company’s Hashtags
Security
Navigating The Security Obstacle Course Of 2018
The last few years have seen a veritable explosion in the gruelling fitness obstacle courses such as Tough Mudder. Dur...
Navigating The Security Obstacle Course Of 2018
Security
Top 3 Pressing Cyber Threats For IoT In 2018
Every year we see new pressing cyber threats, from new targets for hackers to new issues cropping up in the cybersec...
Top 3 Pressing Cyber Threats For IoT In 2018
Security
5 Reasons To Use Role-Based Access Control (RBAC)
Role-based access control (RBAC) allows organisations to restrict access to certain systems, allowing only certain a...
5 Reasons To Use Role-Based Access Control (RBAC)
Security
Information security from a business perspective
As enterprises struggle to remain profitable in an ever-changing risk environment, the current economic crisis has eleva...
Information security from a business perspective
Security
Phishers Break WoW’s Magic Spell Over Gamers
While I've touched on the subject of World of Warcraft phishers (and the Trojans they attempt to spread) a handful o...
Phishers Break WoW’s Magic Spell Over Gamers
Security
Sophos And Bit.ly: Making Short Links Safer
Here's some good news if you're one of the millions of people who have come to depend upon shortened urls in your da...
Sophos And Bit.ly: Making Short Links Safer
Security
Information Is At Its Most Vulnerable Just Before Employees Resign
Naivety and misplaced trust are a dangerous combination in business. Nowhere is this more clearly seen than when it ...
Information Is At Its Most Vulnerable Just Before Employees Resign
Security
With Great Opportunity Comes Great Responsibility: The Role Of Business In Shaping Internet Policy
One of the priority themes at this year's UN Commission on Science and Technology for Development (CSTD) held in Gen...
With Great Opportunity Comes Great Responsibility: The Role Of Business In Shaping Internet Policy
Security
Top Network Security Issues 2014
Theorising what the most important IT security issues to address may be at any given time is always a highly subject...
Top Network Security Issues 2014
Security
Where Is The UK’s Trusted Identity Provider?
Consumers are growing increasingly keen on the use of social identity to fast-track access to online products and se...
Where Is The UK’s Trusted Identity Provider?
Security
PRISM And Cyber Spying: The Harsh Reality Of Being A European Company
Over recent years, cyber attacks, cyber terrorism and cyber espionage have become more prevalent in the public consc...
PRISM And Cyber Spying: The Harsh Reality Of Being A European Company
Security
5 Reasons To Use Role-Based Access Control (RBAC)
Role-based access control (RBAC) allows organisations to restrict access to certain systems, allowing only certain a...
5 Reasons To Use Role-Based Access Control (RBAC)
Security
Is Your Organisation Edward Snowden Proof?
It's likely Ed Snowden couldn't have dreamed of a better reaction to his work. Since leaking the extent of intellige...
Is Your Organisation Edward Snowden Proof?
Security
Protecting Against Advanced Persistent Threats: Choosing A Security Solution
Advanced Persistent Threats (APTs) are a growing danger to all organizations. Unlike legacy malware, which operate o...
Protecting Against Advanced Persistent Threats: Choosing A Security Solution
LATEST ARTICLES
Security
Put Social Media Policies On Your List Of New Year’s Security And Privacy Resolutions
Over at Baseline magazine this week, writer Nick Wreden has a good article on "Social Media Policy Development," summari...
Security
CitySights Card Hack Could Generate PCI DSS Fallout
Reports that the Web site of a New York-based tour firm has been hacked and around 110,000 bank card details lifted by h...
Security
Is There Such A Thing As Safe Social Networking?
In the battle against cybercrime, there is one undisputable fact: the bad guys are working harder, faster and smarter th...
Security
Learning From The (Digital) Natives
Not much more than a decade ago, a great many of us—of a certain age—realized that we were explorers aboard an intim...
Security
Are You Providing Security For Your Customers?
Security should not be considered exclusively within the context of one's organization and environment, it is also impor...
Security
Gadgets Undermine Corporate Security And Efficiency
Organisations are struggling to keep up with staff needing to access their desktop, email or corporate information on th...
Security
Tips On How To Avoid The Top 5 Internet Security Holes
Data theft and other online threats presently represent a significant danger for businesses in the UK. Compounding this ...
Security
US Outlaws “Negative Option” Deceptive Online Selling
The U.S. Federal Trade Commission has issued a press release detailing the consumer protections in the Restore Online Sh...
Security
Making The Network Secure In 2011
IT managers are right to be wary of new threats like viruses coming in on infected devices such as USB sticks (like Stux...
Security
8 Top Tips To Secure Travel
‘Tis the season to be jolly – and to leave sensitive corporate information behind at the airport!According to t...
Security
Son Of God At Risk From Social Networking
A good friend of mine sent me a link to a really great viral video entitled “The Digital Story of Nativity (or Christm...
Security
Smartphones Represent The Newest Front In The War On Cyber Crime
Smartphones represent “the newest front in the war on cyber crime,” say security firm Webroot. The firm predicts tha...
Security
Making Compliance Real For Those In The Trenches
I recently presented at a webinar alongside LogLogic on the issues of compliance for IT professionals. Here is an edite...
Security
Time To Get Your ACTA Together
We know it's a long way from perfect. We deplore the secretive and undemocratic manner in which it was negotiated. And w...
Security
Cybercrime, Cyberwars, Cyberterrorism And Hacktivism – Part 3
There are a variety of ways in which websites and public-facing computer systems can be attacked by hacktivists, and att...
Security
Securing Retail Environments From The Insider Threat
The retail industry is one that operates under tight profit margins and the recent economic slowdown has seen those marg...
Security
What’s Really In The Drugs You Buy Over The Internet?
The U.S. Food and Drug Administration has sent a letter to manufacturers and trade groups seeking their help in preventi...
Security
Cybercrime, Cyberwars, Cyberterrorism And Hacktivism – Part 2
The internet is a fantastic tool for organising attacks. Back in 2005 a web forum for Muslim extremists called on its me...
Security
British Government Facing Cyber Security Threat Due To Pro-WikiLeaks Attacks
The WikiLeaks scandal is showing no sign of slowing as groups increasingly target any detractors of the site. With Julia...
Security
2010: The Year Cyber Threats Went Social
We're used to hearing about the threats posed by lone hackers and international cyber gangs, but 2010 has seen an increa...
Security
Email Privacy Protected By Fourth Amendment, Says US Sixth Circuit Court Of Appeals
The EFF (Electronic Frontier Foundation) claimed a victory as the US Sixth Circuit Court of Appeals ruled on the so-call...
Security
Cybercrime, Cyberwars, Cyberterrorism And Hacktivism – Part 1
This month (December 2010) has seen the mainstream media alive with stories of hacktivists attacking payment websites, i...
Security
Automating Private Key Management Holds The Secret: What Your PCI Auditor May Not Be Telling You
The PCI Data Security Standard (PCI DSS and PCI 2.0) is nothing more than a series of guidelines that constitute securit...
Security
Anti-Virus, Malware, And Phishing Software Is No Longer Effective
In-house and internal threats will be a big element of 2011 as organisations begin to understand that anti-virus, malwar...
Security
GCSx: No Time To Relax The Security Standards?
These are times of unprecedented change for the Public Sector. Whilst the dust settles following the recent comprehensiv...
Security
Hactivism 101
Hacktivism is the use of cyber attacks and sabotage to communicate politically motivated causes; it is as old as the int...
Security
Email This!
Spammers are abusing the social media sharing functionality of popular web sites, to bypass spam filters.I received ...
Security
Malware As A Video Game: “Voluntary Botnets” Being Used In Pro-WikiLeaks DDoS Attacks
Hadn't really posted anything here yet about the ongoing WikiLeaks saga, but like seemingly every other network security...
Security
Wikileaks DDoS Arrests, Microsoft Set To Fix Three Vulnerabilities That Allow DDoS Attacks
A 16-year-old boy suspected of being involved in the attacks on the MasterCard and PayPal sites was arrested yesterday i...
Security
No Stopping Operation Payback
I have been closely tracking the Anonymous Hacker Group and its attacks against various Web sites and have found that th...
Security
Why Being Proactive In Security Is Essential
We have always been taught that once your system is compromised you need to either restore a clean backup or re-install ...
Security
Companies Must Prepare For Frantic Friday Employee Online Shopping
The big freeze that hit the UK at the start of December is likely to be felt in more ways than one. The big freeze means...
Security
Freedom Exists In A School Book
The continuing DDoS attacks on major commercial websites in support of Operation Avenge Assange raise some interesting q...
Security
The Growing Scope For IP-Based Surveillance
The value of camera surveillance at a property has always been recognised, but when it comes to home security for the co...
Cloud
Security
Securing Your Privileged Identity: Is Anyone In Control Of Cloud Security?
There are those who argue that the age of Cloud computing is merely in the minds of the more far-sighted IT visionaries....
Security
Today’s Threats Require Joined-Up Security
The security threats that we face today are complex and sophisticated and are designed to do real harm—stealing data, ...
Security
Russian Spam King Facing Charges In US Federal Court
Oleg Nikolaenko, 23, of Moscow, Russia, was due to face arraignment in U.S. Federal Court in Milwaukee today in the wake...
Security
Could NAC Have Stopped Operation Aurora Attacks On Google?
In January 2010, Google disclosed that sophisticated cyber attacks on its computer systems had resulted in the theft of ...
Security
Selling The Real Spyware?
In a report from the BBC, it was revealed that the the British intelligence community was considering ways in which it c...
Security
Is Your VOIP Secure?
VOIP has tremendous benefits for business users – which include cost savings and greater productivity – but like any...
Security
“Smishing” (SMS Phishing) And “Vishing” (Voice Phishing) On The Upswing, FBI Warns
The Federal Bureau of Investigation (FBI) issued a new warning recently about new phishing attacks carried out via SMS t...
Security
KPMG Data Loss Survey Points To Insider Access Governance Risk
The 2010 KPMG Data Loss Survey points to the increasing amount of insider access risk that organizations are realizing. ...
Security
Most Organisations Have Experienced At Least One Security Breach
Symantec and the Ponemon Institute recently teamed up on study, the results of which have been published today. The stud...
Security
Top 10 Privacy Issues For 2011
As is traditional during the fourth quarter, IT vendors begin putting out predictions for the coming year. Both consumer...
Security
Insider Threat Behind Wikileaks Cybersecurity Saga
The Wikileaks saga of the last few days, which climaxed with the release of the first batch of more than 250,000 secret...
Security
There’s A Bounty On Your Applications
In the last year there have been a number of organisations offering rewards, or ‘bounty' programs, for discovering and...
Security
Sky News, Stuxnet And The End Of The World
So Stuxnet hit the TV news again last night as it was announced that "Cybercriminals have got hold of the Stuxnet virus....
Security
Love And Money: A Warning About Internet Romance
The U.S. Federal Trade Commission has posted some advice for those seeking love in all the wrong places (like on the Int...
Security
Fronting Up To Card Fraud
Some cheeky individual tried to steal my money this week. I'm not sure how they got my card details, but they did and tr...
Security
Anti-Virus Alone Is A Poor Strategy
Computer viruses and other malware such as worms, trojans and spyware, are rife and can cause tremendous damage to syste...
NEWER
«
1
…
24
25
26
27
»
OLDER
Older
Newer
What would you like to submit?
Byline Article
Press Release
This website uses cookies to improve your experience. By using this site, you agree that we may store and access cookies on your device.
Accept
Read More