• Have I been hacked? The indicators that suggest you have

    Security professionals are constantly on the hunt for potential vulnerabilities and looking for ways to defend their networks. The term “indicator of compromise” (IOC) – first coined by governments and defense contractors trying to identify advanced persistent threats (APTs) – is something that all information security experts are familiar with.

  • User behavior analytics: The equalizer for under-staffed security teams

    In a perfect world, security professionals would see a few alerts, recognize the pattern, identify the malware and the hacker, and solve the problem – all with only a few mouse clicks. However, no matter how seasoned and deep security teams are, it doesn’t work like that. Since cybercriminals seem to remain a few steps ahead and trends suggest this isn’t likely to change, skilled and savvy security pros are in high demand. At the moment, there are more than 209,000 cybersecurity jobs left unfilled with the demand for expertise greatly surpassing the supply of skilled workers, according to Peninsula Press.

  • Wi-Fi and security are better together for SMBs

    Wireless adoption is growing fast globally, with Wi-Fi access becoming ubiquitous in businesses, stores, corporate environments and public spaces; literally everywhere we go.

    As a small to midsized business (SMB), you may be considering or already offering Wi-Fi as a service to your customers. It’s a great idea. SMBs are adding Wi-Fi access in their environments to increase customer satisfaction, build loyalty, repeat visits, and enable unique marketing opportunities. Customers appreciate and come to expect a fast, reliable secure wireless network experience.

  • You can't stop what you can't see: Mitigating third-party vendor risk

    Third-party vendors are a liability for host organizations, often unwittingly creating backdoors and exposing sensitive data. In fact, according to the Ponemon Institute “Aftermath of a Data Breach Study,” 53 percent of organizations felt vulnerable to another breach due to negligent third parties including vendors and outsourcers.

  • An Internet of Things wish list for 2016

    I’ve been writing about the Internet of Things for a while now, both from the perspective of the great opportunities that the IoT offers and the very real pressure it will put on both security practice and legislation designed to protect our privacy.

  • Demanding accountability: The need for cyber liability

    GCHQ director Robert Hannigan pulled no punches last month when he stated that the free market is failing cybersecurity. And with 90% of large organisations and 74% of small businesses reporting that they had suffered a breach in 2015, and high profile breaches constantly splashed across the headlines, his concern is well placed as he argued that cybersecurity standards are “not yet as high as they need to be”.

  • Will IT security be different next year?

    It is that time of the year again where we delve into the back of the cupboard and dust off the crystal ball as we make our predictions for the year ahead. This annual ritual has become something of a mainstay for some security professionals as they dream up (quite often) the weird and wonderful threats and challenges that they believe could affect businesses each year.

  • Facebook drops Flash, adding one more reason for users to stop using it altogether

    Facebook recently announced it stopped using Adobe Flash for web videos that appear on its News Feed, Pages and the embedded Facebook video player, instead deploying a video player built around HTML5.

  • Top trends that will influence your security decisions in 2016

    With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, but by anticipating the next wave of threats, businesses will hopefully be better prepared to avoid the evolving tactics and exploits that criminals will use to target them.

  • Rackspace CSO on security: It's time to go back to the fundamentals

    We no longer need to spend time discussing the sophistication and persistence of the threat; the risk associated with IoT and mobile devices, the devolution of the perimeter; the need for deterrence over prevention and the value of security versus compliance. By now, these should be well-understood concepts and issues.

Videos      Podcasts


Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco ASA products - appliances, firewalls, switches, routers, and security modules - have been found sporting a flaw that can ultimately lead to remote code execution by attackers.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Feb 12th