Trading in Compromised Remote Desktop Services
There is a criminal underworld of compromised services in existence on dark web forums
‘We'll Always Have Paris’ – Highlights from ISSE Conference 2016
This week the beautiful city of Paris played host to the 17th annual ISSE Conference, bringing together a raft of security professionals and experts from around the world to discuss, debate and shape the future of digital identity
Closing the Gender Gap in Cybersecurity: Its Time to Back Ourselves as an Industry
Cybersecurity is facing a frightening skills gap, so to put it simply, we need more people, so we need more women
Assessing the Cost of Brexit from a Cybersecurity Standpoint
The cybersecurity community is equally looking to assess the impact of Brexit
5 Common Mistakes When Dealing with Security Stakeholders – and How to Avoid Them
Managing an initiative as business-critical as cybersecurity means IT and security leaders need to work closely with various stakeholders to agree to the security strategy, put them at ease that it will work and give them confidence that it will be effective
Everything You Need to Know About RDNH
Every business needs to take great care with its domain name. This is the word or words you choose to form your website address, literally your identity on the world wide web
The Pitfalls of Awareness
Dr Jessica Barker reveals the three pitfalls of security awareness
#FutureDecoded Dreaming of Electric Employees
If you believed that terms such as artificial intelligence (AI), machine learning and digital transformation were the stuff of science fiction, then other sections of IT are proving that this is the new reality.
Mirai - How a Botnet Made IoT a Security Reality
I’ve been hearing about IoT for a number of years, and it was not until 2013 until I understood what the concept was about, and sometime after that the term was more defined as the concept of connected devices became more of a reality.
International Cybersecurity Regulation Needs to Become Standard
Harshul Joshi, DarkMatter, explains why international cybersecurity regulation needs to become the standard now
Roundtable: Former Deputy Director of NSA Talks Insider Threats
Chris Inglis discusses the insider threat talking his experiences with the NSA, transparency and the use of behavior analytics
The Shape of Things to Come – Advanced Networking Security for IoT
There are all sorts of potential for IoT-related applications to streamline business processes and provide new ways of interacting with customers.