Privilege controls can work, but cannot cater for all eventualities, says Quocirca analyst Rob Bamforth.
As Hearbleed slows down the internet, experts say that two-factor authentication may the way forward to protect our web sessions.
You could be implicated as a criminal suspect, just by virtue of having that image in the non-criminal file, says the Electronic Frontier Foundation (EFF).
The National Retail Federation in the United States has announced plans to establish the Information Sharing and Analysis Center (ISAC), so that retailers can work together on incoming cyber security threats.
Single step authentication on Galaxy leaves PayPal accounts open to abuse say German researchers.
As another week in information security zips by, we look at the top stories in our weekly In Case You Missed It (ICYMI) column.
There's an increasing demand for cyber security specialists in information security, but the challenge remains bringing the right graduates into the fold.
IT decision makers are leveraging Big Data security analytics tools to serve up more information on threats, reports Doug Drinkwater.
The adversary has enormous capabilities in the cyber world, but it too is not without its vulnerabilities, and these must be exploited says Calum MacLeod.
As the Heartbleed bug demonstrates, passwords - especially the way they are commonly used across sites - are inherently vulnerable suggests Chris Russell
Oganisations need to cooperate and share threat intelligence in order to increase the cost of cyber attacks for hackers suggests Russ Spitler, VP product management, AlienVault
This is how to secure data in the cloud
Exclusive video webcast & Q&A sponsored by Vormetric
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.