Follow Us

Close
Like what you're reading?

Subscribe to receive periodic updates about new posts by email, or follow us via Twitter or RSS.

Please enter a valid e-mail address to subscribe.

Close
Close

You have subscribed.

Recent Posts

Pie chart

Survey: What Employees (Don’t) Know About IT Security Policies

In this era of regular breaches, security awareness is a must. But how well do employees know their firms’ IT security policies? We reveal all.

risk perception dice

How Understanding Risk Perception Can Enhance IT Security

Why do people do dumb things on the Internet and how can we stop them? In this article, security practitioners and cognitive psychologists reveal all.

cardsfeaturedimage

Survey: Consumer Confidence in the Security-Breach Era

We live in an age of massive security breaches, but what can firms do to regain consumer confidence after a hack? We polled the public to find out.

futurejobscrop

Surveying the Threat Landscape: 5 Future Careers in Cybersecurity

The world of IT security is changing so fast it’s difficult to keep pace. In this article, we ask experts to predict the shape of security careers to come.

PCI_icon-sin7 featured

How to Avoid the Seven Deadly Sins of PCI DSS Failure

PCI DSS compliance is a headache for many businesses. In this article, experts identify the main points of audit failure and provide solutions.

buzzwordsIVcrop

Buzzword Babylon IV: Still More Baffling IT Security Terms Explained

Confused about SIEM? Baffled by VPN? Vague on vulnerability scanning? Worry no more! In this article top experts demystify IT security buzzwords.

Darya Loseva.featuredimagejpg

From California to Moscow: 3 Women Leading the Way in IT Security

Three prominent women working for IBM, Cisco and Kaspersky Labs tell their stories, and offer tips, advice and insights into the world of IT security.

heartbleed

67 Percent of Internet Users Haven’t Changed Passwords After Heartbleed

Heartbleed is one of the worst security bugs in the history of the Web, but does the public care? Our survey exposes massive ignorance and indifference.

AppleWorm

Mac Attacks Do Happen: How to Protect an Office of Apples

Do Macs get viruses, or is your Apple computer a special snowflake? How do you protect MacBooks and iPhones? We asked, top experts answered!

babylon III

Buzzword Babylon III: Even More Baffling IT Security Terms Explained

Confusing jargon abounds in IT security. In this article, top experts from international firms define Threat Intelligence, NAC and IAM in plain English.

Question sign babylon II

Buzzword Babylon II: IT Security Experts Explain More Baffling Terms

IT security terminology can be mystifying for business owners. In part two of this series, experts translate DLP plus web and email gateways into plain English.

buzzbab1

Buzzword Babylon I: 5 Experts Explain 4 Baffling IT Security Terms

IT security is a world of confusing terms and technical jargon. In this article, five experts translate EPP, UTM, MDM and NGFW into plain English.

Cyber Security Scholarships

Top Scholarships for Aspiring IT Security Professionals

A guide to top scholarships for aspiring IT security professionals, including awards available from Hewlett Packard, (ISC)² and the U.S. government.

3mobile malware

The New Era of Mobile Malware: 4 Steps to Reduce Your Risk

Mobile malware is on the increase. Here are four steps companies can use to mitigate risk and reduce the chances of infection.

2 Factor authentication

Two-Factor Authentication: What Small Businesses Need to Know

Two-factor authentication is a form of added security protection businesses can use to protect sensitive data. Here is what you should protect first.

security1

7 Essential Questions to Ask When Hiring an IT Security Consultant

Three experts advise business owners and executives on how to get the most revealing answers from an IT security consultant during an interview.