• Think before you share that file

    Various file-sync-and-share providers have made headlines for their inadvertent data leaks. These events shine a light on some of these file-sync-and-share services’ shortcomings and beg the question of whether enterprises should be allowing such services in their business operations at all.

  • What all major brands share in common with the Snappening

    By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet on the web is writing about it.

    The vague, inconsistent, and unconfirmable information surrounding the Snappening caught our interest. We decided to dig in and see if we could shed light on this confusing, media-hyped event. We discovered this is not much different from the threats that all major brand presences face online, today.

  • The Software Assurance Marketplace: A response to a challenging problem

    The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has recognized how critical the state of software security is to the DHS mission. The SoftWare Assurance MarketPlace (SWAMP) is DHS S&T’s response to build the solutions needed to better protect the nation and improve the quality of software that powers our critical infrastructure and Internet communities.

    The SWAMP is a free, online, open-source, collaborative research and development environment that provides a host of software analysis resources, assessment services and software assurance capabilities to software developers, tool developers and software researchers. These resources, services and capabilities were designed to assist software developers in vetting their software code for weaknesses.

  • How security-wary retailers can prepare for the holiday season

    Retailers are beside themselves with worry as the spate of data breaches among them continues. With Black Friday approaching, what can retailers still do to protect themselves from these cybercrooks?

    While it may be too late for retailers to do anything major with their IT platform, network and infrastructure to protect them substantially from this year’s anticipated denial of service (DoS) attacks, there are some actions IT teams can take.

  • Detecting cyber attacks in a mobile and BYOD organization

    Many organizations understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices. This application note sets out to explore the challenges, understand the needs, evaluate mobile device management as an approach to detecting attacks and offer a flexible and high efficacy solution for detecting any phase of an ongoing attack on mobile devices regardless of device type, operating system or applications installed.

  • Identifying deceptive behavior in user-generated content

    In this interview, JT Buser, Manager of Authenticity and Fraud at Bazaarvoice, talks about challenges involved in identifying deceptive behavior in user-generated content as well as interesting techniques he's seen scammers use.

    Bazaarvoice is a network that connects brands and retailers to the people. Each month, more than 500 million people view and share opinions, questions and experiences tens of millions of products in the Bazaarvoice network.

  • Twenty five years of firewall innovation

    When the internet was first launched on a mass scale back in the late 80s, it is understandable that the technology industry got more than a little excited – the way we communicate and thus the entire world around us was being changed for good. But there was one problem: the internet was not designed with security in mind.

    It was not long of course, before criminal minded people took advantage of this oversight and the first internet virus was circulated in 1988. Thankfully the security industry was hot on their tails, launching the first firewall in 1989. And thus began the ongoing battle between security experts and cyber hackers that has continued over the last 25 years.

  • Integrating IT security at the board level

    Eisk is usually only managed at the board level once a major attack has taken place, which, besides being by far the most expensive way to resolve such problems, is neither logical nor sustainable.

    Cybercrime must be tackled from the top down in a proactive and strategic way in order to prevent such crippling financial and reputational damage from occurring on a regular basis.

  • Seven Destiny video game tactics that translate to cyber security

    Why learn by grinding through dry security best practices when you can make education unique by mixing in a little geeky fun? In the third installment of my security pop culture series (see Part 1/Part 2), I share what Destiny – Bungie’s popular new MMOFPS video game – can teach you about network and information security. Learn how to become an Internet Guardian and fight the encroaching cyber Darkness with these seven tips.

  • How can parents keep their children safe on the Internet?

    In today’s society, children are unquestionably more tech-savvy than ever before, with far greater access to gadgets and a veritable wealth of information at their fingertips along with a heightened understanding of technology and how it works. However, children will not be as aware of the scams that cyber-criminals are crafting specifically to dupe them.

Videos      Podcasts


Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Fri, Nov 21st