• Tips to avoid online scammers this holiday season

    With Black Friday and Cyber Monday offers, often dramatically cutting prices for one day only, there will be many genuine deals to be had. The problem for many of us is how to spot the real deal, from the scam? Here’s five tips to prevent you gifting your money to the criminals these holidays.

  • Fighting malware, emerging threats and AI

    Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the cloud.

  • User behavior intelligence in the expanding supply chain

    Every business now has a connected ecosystem of partners; even the Department of Defense has a chain of suppliers connected by Internet access. Unfortunately, not all of these businesses are at the same level of sophistication when it comes to their security posture.

  • How the threat landscape is shaping the network security business

    Pat Calhoun is the Senior Vice President & General Manager, Network Security, at McAfee. In this interview he talks about constructing the strategic direction for McAfee’s Network Security business, he defines the Next Generation Firewall of the future, and much more.

  • Does cyber insurance help the CISO get a seat in the boardroom?

    CISOs and cyber security leaders have long struggled to gain a voice in the boardroom. Shut out of leadership meetings and strategic decision-making, IT security has often been seen as little more than a compliance-driven, check-the-box initiative that requires minimal continuous effort to maintain. Some CISOs simply serve as scapegoats, accepting blame when breaches occur and ignored when the horizon is clear.

  • Risk assessment benefits, best practices and pitfalls

    Ryan Ward is CISO at Avatier. In this interview, he talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, outlines the pre-requisites for becoming a risk assessment professional, and more.

  • The evolution of threat detection and Big Data

    Mark Gazit is the CEO of ThetaRay, a specialist in threat detection. In this interview he talks about leveraging Big Data to secure networks, the advantages of using math-based anomaly detection as well as the evolution of threat detection in the past decade.

  • Job description: Infosec Ranger at Pwnie Express

    When I learned that well-known hacker and conference speaker Jayson Street decided to join the Pwnie Express team, I knew this was the perfect time for an interview.

  • Enabling secure file sharing in the enterprise

    As enterprise mobility meets collaboration, the workplace as we know it is transforming. Gone are the days when employees stopped working after leaving the office or disseminated photocopied reports for discussion in a group meeting. Today, information workers are increasingly using mobile devices as portable desktops to support what is fast becoming a 24x7, “work wherever, whenever” preference. While this flexibility boosts productivity, it also leads to increased security risks.

  • The most unpopular person in the room

    That’s me. At least I was the week I wrote this. I had the wonderful opportunity to speak at a number of conferences that were not solely related to security. Firstly it was absolutely fascinating to learn about how organizations are innovating within the Internet of Things. From the deployment of billions of connected sensors into our everyday life, to connected wigs, and mining onto comets, our future looks exciting.

Videos      Podcasts


Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Mon, Nov 24th