Infosecurity News Features

Harsh Lessons Learned by Linkedin

Harsh Lessons Learned by Linkedin

A 2012 breach of LinkedIn user data was believed to have contained “close to 6.5 million unsalted password hashes” and for this writer, it taught me a lot about salting and hashing as LinkedIn raced to fix the issue.

Human Error Considered Biggest Security Threat to Orgs, New Study Finds

Human Error Considered Biggest Security Threat to Orgs, New Study Finds

NODE4's study examines the attitudes and precautions adopted by ITDMs regarding the cyber threat landscape.

Microsoft Using Machine Learning to Strengthen Security

Microsoft Using Machine Learning to Strengthen Security

Microsoft has released the newest version of its Security Intelligence Report which analyzes the threat landscape of exploits and vulnerabilities the industry faced in the second half of 2015.

Techniques of Cyber-Criminals Continue to Evolve

Techniques of Cyber-Criminals Continue to Evolve

New report reveals that cyber-criminals have adopted an organizational shift in how they carry out their attacks.

San Bernardino Case May be Over, but Gov Access Issue Will Not Go Away

San Bernardino Case May be Over, but Gov Access Issue Will Not Go Away

The US government has found its own way into the iPhone of San Bernardino gunmen Syed Farook, dropping 'backdoor' demand

Will the £35K Rule Hit the Security Industry?

Will the £35K Rule Hit the Security Industry?

As of 6 April 2016, skilled workers in the UK on Tier 2 visas (sponsored 'work permits') will only be able to secure Indefinite Leave to Remain in the UK if they are earning at least £35,000 per year.

CRESTCon & IISP Congress 2016: What Role Do Ethics Play in Security?

CRESTCon & IISP Congress 2016: What Role Do Ethics Play in Security?

Toby Stevens, Director of Enterprise Privacy Group, discusses the role that ethics play in privacy and the importance for security professionals to act and work ‘ethically’.

How to DCEPT your Attackers

How to DCEPT your Attackers

A look at the “open source honeytoken tripwire” DCEPT from Dell Secureworks

Australian Orgs Will Struggle with Data Breach Bill

Australian Orgs Will Struggle with Data Breach Bill

Consulting firm Protiviti has predicted Australian companies will face confusion when complying with the Federal Government’s mandatory data breach notification proposals

#RSAC: CSI:Cyber Panel Aims to Please Critics

#RSAC: CSI:Cyber Panel Aims to Please Critics

Despite CSI:Cyber receiving unpopular reviews from the security community, it has been renewed for a second series and this week at RSA Conference in San Francisco, two members of the cast and its creator took centre stage in the keynote theater.

Ransomware: Prevention vs Cure

Ransomware: Prevention vs Cure

Can a focus on vigilance prevent cyber extortion, or is prioritizing a strong recovery plan the way forward?

#RSAC: Innovation Sandbox Presents Ten of the Best

#RSAC: Innovation Sandbox Presents Ten of the Best

The ‘Innovation Sandbox’, the process sees vendors enter and be reduced down to a final ten, who get the pleasure of presenting three minute pitches to a panel of judges

What’s Hot on Infosecurity Magazine?