A simpler online life: trusted use of your social identity
Using social identities to login to other services can make our online lives more convenient and secure. However, there must be choice, and backend identity management must evolve to support the concept.
Containing the application security problem
Containerisation is proving to be a popular and effective way of deploying apps, especially in a DevOps environment. This poses new security challenges, but also new security solutions.
The IOT’s Journey from the Spy in the Cab to the Flat (Cow) Field
Are IOT use cases totally at mercy of legislatures whose decisions, could be as far reaching as they are unpredictable?
Better Late Than Never
Even in this era of embracing technology, there is still a vast void between understanding the technology, and recognizing the implied significance imposed on any scene-of-crime.
A Synchronized Approach to Network and Endpoint Threat Intel
A synchronized security protection approach that takes a fresh view of how threat intel can be used
Terror Warning Messages Spread Malware
The efforts target United Arab Emirates-based companies and employees, as well as Bahrain, Turkey and, more recently, Canada.
Why the Legal Profession Needs to Think About Visual Privacy
Increased focus on visual privacy is taking place across the board, but particularly in some professions, of which legal is a good example.
Brought to you by
Protection—From Inside Out
Defending against hacks is very much a case of looking to both the inside and outside of organizations.
Don’t Get Bitten: The Story of the Social RAT-in-the-Browser
The next generation of Remote Access Trojans could make fraudsters more eager than ever to find new solutions that help penetrate user networks quickly and easily
Individual Privacy: The Latest Victim of Anonymous Hacks?
Although Anonymous has galvanized a cult-like following into the age of 21st century civil disobedience, the internet has long been known to house a dungeon of unsupported information, and anonymity has occasionally added fuel to the fire.
They Also Serve, Those That Keep Things Ticking Over
Nice to haves in business are very much a thing of the past. But what about those items that are essential whose immediate value is not readily apparent.
Countering the Terrorism Cyber-Threat
With cyber terrorism in the spotlight, how are cyber-tactics being used as a means to aid and conduct terrorist activities and what is the distinction between use of the internet and offensive cyber-techniques?