#ISC2CongressEMEA: The Monkey, The Human & The Cybersecurity Awareness Program
When it comes to security training and awareness, the prime objective of many organizations is to be able to demonstrate that all staff have completed security awareness training.
#ISC2CongressEMEA: Combined Mitigation for Cyber and Physical Attacks
At the (ISC)2 Congress EMEA in Dublin on October 18 2016, Barrie Millett drew upon his experience from the military and his resilience roles at E.ON and GE to advise on combined mitigation for cyber and physical attacks.
The Yahoo hack – a numbers game
Have you got a Yahoo email account? Was it one of the 500 million accounts compromised by the breach disclosed by Yahoo in September 2016? Does it matter if it was?
Nok Nok adds a risk engine for FIDO driven authentication
The addition of a risk engine to Nok Nok’s FIDO-driven Authentication Server further strengthens the way web service providers can authenticate the consumers they transact with.
Digital Rights Management 2.0
There nothing new about the need for digital rights management (DRM). However, what DRM tools are expected to achieve has changed over the last decade or so.
Biometrics: the New Frontier in Security, but Why Aren’t We There Yet?
Biometrics is often considered to be the cutting-edge technology that the security industry needs to adopt to help drive innovation in the digital age
#ISC2Congress: How to Hire and Get Hired in Infosec
The session contained a lot of really useful insight and advice on how to hire, and get hired, in information security.
#ISC2Congress: How to Mentor an Information Security Professional
Jeff Silver, senior security engineer at RSA corporation, gave a talk at (ISC)2 Congress in Orlando, Florida, on how to build up infosec professionals through mentoring programs.
#CLOUDSEC2016 : Tenacity and Problem-solving Trump CISSP, says Rik Ferguson
At CLOUDSEC in London on 6 September 2016, Rik Ferguson, VP president security research, Trend Micro, presented in a session titled ‘Take Control: Empower the People’
How Businesses Can Combat Cybercrime and Win the 'Cyberwar'
Data protection and security concerns around mobile devices are two serious cybercrime issues businesses both large and small must realize, while already happening today, are going to become even more prevalent tomorrow
Gotta Hack em’ All: Pokémon Go, Security and Privacy Awareness
The Pokémon Go incident served as a litmus test of where the average person stands in terms of their security and privacy awareness
Top Tips to Keep the Hackers at Bay
What was once a couple of physical doors that kept your office safe is now a multitude of virtual doors that you can’t control