Secure your APIs — don’t give hackers a chance!

| | General Security
Introduction The use of APIs is now ubiquitous, and the “API economy” is well and truly established. From cloud-based services, back-end services for mobile apps, internal server-to-server services,... Go on to the site to read the full article ... Read More

Top cybersecurity lessons for e-commerce website administrators

| | General Security
Introduction In 2018, card-skimming malware targeting Magento-based online stores resulted in the infection of 7,339 e-commerce sites. Any customer entering card details into the site then had those... Go on to the site to read the full article ... Read More

The user experience of security

| | General Security
Introduction Back in the 1990s, when you mentioned cybersecurity to anyone, a glazed look would come over their face. And fair enough. Security, as a discipline of IT, was a bit dry and boring. Then... Go on to the site to read the full article ... Read More

Benefits of teaching employees to hack

| | General Security
Introduction You know that look in an employee’s eye when you announce the call to cybersecurity awareness training. They already work in IT or know a lot about computing. They also let you know they... Go on to the site to read the full article ... Read More

Response to IT industry trends analysis 2020

| | General Security
Introduction The Computing Technology Industry Association (CompTIA) has just published its Industry Trends Analysis 2020. This publication takes a generalized look at the landscape in which IT... Go on to the site to read the full article ... Read More

How big is the skills gap, really?

| | General Security
Introduction No doubt you will have noticed, in the past few years, that voices are being raised about something called the “skills gap.” The discussion is not just happening in the U.S. Countries... Go on to the site to read the full article ... Read More

Cyber Work podcast: The current state of AI in cybersecurity

| | Cyber Work Podcast
Introduction Eric Stevens, vice president of engineering and principal architect at ProtectWise, gave the Cyber Work with Infosec podcast an insider view of the use of artificial intelligence (AI) in... Go on to the site to read the full article ... Read More

Rules of Engagement in Pentesting

| | Penetration Testing
When you create a software product or build a service or create a platform, it’s a good idea to make sure it is secure. The data we generate is feeding the cybercriminal appetite to the point that... Go on to the site to read the full article ... Read More

ThreatMetrix Cybercrime Report: An interview

| | Cyber Work Podcast
Introduction In a recent Infosec Cyber Work podcast, we welcomed Rebekah Moody, market planning director at ThreatMetrix, a LexisNexis Risk Solutions company. Rebekah also co-authored the H2 2018... Go on to the site to read the full article ... Read More

Can your personality indicate how you’ll react to a cyberthreat?

| | General Security
Introduction All of us are as individual as snowflakes in a winter storm … or so we think. Psychologists beg to differ, and in doing so, attribute five main personality types to human beings. ... Go on to the site to read the full article ... Read More