Information Security

Information Security news, information, and how-to advice

mobile device management
hacking cybersecurity padlock motherboard


I Am Henry the Eighth I Am (Not)

Many of us can be forgiven if the recent HBO hack has us recalling the Sony Pictures incident, singing ‘Second verse, same as the first.’ Pub culture aside, the HBO hack actually has little in common with the Sony incident. But HBO’s...

feedback / survey / questionnaire

Caution advised with information security surveys

Cybersecurity reports based on answers from respondents often produce misleading or inaccurate statistics, and they can lead to industry confusion.

mobile payments / tablet

The merging of enterprise and consumer identities means it’s time for a universal identity

The different ways enterprise and consumer identities are becoming even more similar and what we as a security community should do about that.

piggybank target threat

Cost of insider threats vs. investment in proactive education and technology

When it comes to security, education- or technology-based solutions can potentially save organizations a significant amount of money.


Greed drives malevolent insider to steal former employer's IP

An insider leaves to set up his own competitive company, and he accesses his former employer's systems to steal IP and marketing plans — for two years.

internet security privacy

How to protect personally identifiable information under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. Here's what you need to know.

worms virus symantec

It’s time for defensive worms

In this article we explore the next generation of potential defense toolkits – defensive worms.

Stealing I.P.

Intellectual property protection: The basics

Your company's intellectual property, whether that's patents, trade secrets or just employee know-how, may be more valuable than its physical assets. This primer covers everything from establishing basic policies and procedures for...


Cybersecurity maturity is growing up

Performing a cybersecurity maturity assessment on your organization's security will likely yield valuable insights.

Internet privacy

Top 5 tools to protect internet privacy

How virtual private networks (VPNs), proxy services, and onion routers help block ISPs (and search engines) from harvesting user data — and which of these internet privacy tools to choose.

mobile malware

Just say no to Facebook quizzes

Clickbait by any other name is just the same. These quizzes take your personal information, and leave with cookies and malware.

quantum computing KryptAll

A quantum of solace

A digital weapon of mass destruction is just over the horizon. If corporate and government leaders were caught off guard during the recent ransomware attacks, this will truly terrify them.

Predictions for the Future of Programming

How do you predict cyber attacks? Listen to your Cassandras

Author R.P. Eddy says it is possible to anticipate and prepare for security threats. It requires listening to your data experts and empowering them with the right tools.

cyber attack virus meltdown

John McAfee ranks the biggest hacks ever

Tech pioneer John McAfee explains the most damaging and noteworthy cyber attacks of all time.

build freelance tech worker team teambuilding

Separation of duties and IT security

Muddied responsibilities create unwanted risk and conflicts of interest. New regulations such as GDPR now require that you pay more attention to roles and duties on your security team.

6 regulations

GDPR – What security pros need to know about the new era of privacy regulations

Many security professionals no doubt have heard of the new European Union (EU) omnibus data protection regulation called GDPR. GDPR, which stands for the EU General Data Protection Regulation, is in many ways a landmark regulation...

hacked computer security symbol   hacked rot

12 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned.

quell cyber attacks primary

Why SSL/TLS attacks are on the rise

As more companies adopt better encryption practices, cyber criminals are turning to SSL/TLS vulnerabilities to deliver malicious attacks.

Load More