• Compliance misconceptions, challenges and tips

    In this interview, Paul Koziarz, President and General Manager of Regulatory Compliance at CSI, talks about the misconceptions related to compliance, provides advice for CSOs and discusses the difference between being compliant and being secure.

  • Why ending user support for Microsoft XP is the right thing to do

    Today is the day that Microsoft’s well-documented plans to end support for Windows XP comes into fruition, and with roughly 30 per cent of all desktop computers worldwide still running the operating system, that could mean a lot of people are left with little to no security on their PCs or laptops.

  • A security advisor's perspective on the threat landscape

    In this interview, Sean Sullivan, the Security Advisor at F-Secure Labs, talks about threats he's seen during his career, iOS vs. Android security, security awareness and threat evolution.

  • CISO challenges and security ROI

    Mark Brown is the Director of Information Security at EY. In this interview he offers guidance for CISOs, discusses the technical competence of company leaders, tackles security ROI, and more.

  • Does IP convergence open you up to hackers?

    Recent reports indicate that unauthorized persons gained access to Target's network using credentials stolen from a company that worked on the company's refrigeration, heating, ventilation and air conditioning. The ongoing investigation will have to determine whether this was the root cause of the Point-of-Sale (POS) malware, or was a parallel attack. Whichever it turns out to be, it is clear that you should take steps to assure that any access you provide for vendors not be abused or misused.

Videos      Podcasts


Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Fri, Apr 18th