Secure coding must become an integral part of software development
The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development. Alongside this, comes the ever-present threat from...
View ArticleSecurity in the News
IT leadership should keep their eyes on cyber security headlines this month, understanding that the need for effective solutions for securing their information grows more real each day. Recent articles...
View ArticleCyber Crime: How to Prevent an Attack and Mitigate Damage
Over the past couple of weeks, we’ve seen reports of major defense contractors and systems integrators being the target of sophisticated cyber-attacks that appear to have leveraged vulnerabilities...
View ArticleThe Six Biggest Hacking Threats and How to Deal with Them
There are six big hacking threats facing IT today, and I’m sorry to tell you that the hackers are winning. In just the past month, the world’s biggest bourse operator by market value, Hong Kong...
View ArticleTheft by Hacking: Three of the Top Six Threats (Part I)
In my last post, I explained why no organization is safe from hackers. Hackers are successful because most IT organizations still rely on traditional perimeter security—VPNs, firewalls, IDSes, IPSes—to...
View ArticleTheft by Hacking: Three of the Top Six Threats (Part II)
My last two posts — The Six Biggest Hacking Threats and How to Deal with Them and Theft by Hacking: Three of the Top Six Threats — are part of a series covering the six biggest threats hackers pose to...
View ArticleBuilding Castles in the Sky: Mobile Hacking and Its Impact on CyberSecurity
Today we are featuring a special guest blogger, Tom Kellerman, Commissioner on The Commission on Cyber Security for the 44th Presidency of the United States of America. Just a few key questions, and we...
View ArticleYear in the Rear View Mirror: Part III
Finally, I want to highlight Steve Vinsik and his post on Cyber Crime: How to Prevent an Attack and Mitigate Damage. Again, if you remember June time frame, and were following business news, there was...
View ArticleTrick or Treat
Halloween is a few weeks away, and it’s time to start working on costumes for the kids. You feel really creative this year, so you search for “Halloween costume make your own” in your favorite Internet...
View ArticleMicrosoft End-of-Support for Windows XP Date Approaching: Can’t Migrate then...
Microsoft End-of-Support for Windows XP is April 8, 2014. Despite recommendations for migration to Windows 7/8, estimates show that XP still powers one out of every four corporate PCs. Budget...
View ArticleLaw Enforcement and Justice, Part One: The Challenges of Modern Policing
How Safe is Our World? From global terrorist threats and trans-national organised crime, to hackers accessing personal information to facilitate multi-million dollar fraud, law enforcement agencies...
View ArticleWho Was That Masked Man?
It’s Halloween, and you doze off in your comfy chair with a bowl full of goodies, waiting for trick-or-treaters to arrive. The bell rings, and you open up the door to see the masked faces of your...
View ArticleWearable Devices, Hackers, and Consumer Attitudes on Healthcare Security
Given that an electronic medical health record (EHR) is worth hundreds, even thousands of dollars on the black market – compared to just 25 cents for a typical credit card number1 – it is no surprise...
View Article
More Pages to Explore .....