Secure your APIs — don’t give hackers a chance!
Introduction The use of APIs is now ubiquitous, and the “API economy” is well and truly established. From cloud-based services, back-end services for mobile apps, internal server-to-server services,... Go on to the site to read the full article ... Read More
Top cybersecurity lessons for e-commerce website administrators
Introduction In 2018, card-skimming malware targeting Magento-based online stores resulted in the infection of 7,339 e-commerce sites. Any customer entering card details into the site then had those... Go on to the site to read the full article ... Read More
The user experience of security
Introduction Back in the 1990s, when you mentioned cybersecurity to anyone, a glazed look would come over their face. And fair enough. Security, as a discipline of IT, was a bit dry and boring. Then... Go on to the site to read the full article ... Read More
Benefits of teaching employees to hack
Introduction You know that look in an employee’s eye when you announce the call to cybersecurity awareness training. They already work in IT or know a lot about computing. They also let you know they... Go on to the site to read the full article ... Read More
Response to IT industry trends analysis 2020
Introduction The Computing Technology Industry Association (CompTIA) has just published its Industry Trends Analysis 2020. This publication takes a generalized look at the landscape in which IT... Go on to the site to read the full article ... Read More
How big is the skills gap, really?
Introduction No doubt you will have noticed, in the past few years, that voices are being raised about something called the “skills gap.” The discussion is not just happening in the U.S. Countries... Go on to the site to read the full article ... Read More
Cyber Work podcast: The current state of AI in cybersecurity
Introduction Eric Stevens, vice president of engineering and principal architect at ProtectWise, gave the Cyber Work with Infosec podcast an insider view of the use of artificial intelligence (AI) in... Go on to the site to read the full article ... Read More
Rules of Engagement in Pentesting
When you create a software product or build a service or create a platform, it’s a good idea to make sure it is secure. The data we generate is feeding the cybercriminal appetite to the point that... Go on to the site to read the full article ... Read More
ThreatMetrix Cybercrime Report: An interview
Introduction In a recent Infosec Cyber Work podcast, we welcomed Rebekah Moody, market planning director at ThreatMetrix, a LexisNexis Risk Solutions company. Rebekah also co-authored the H2 2018... Go on to the site to read the full article ... Read More
Can your personality indicate how you’ll react to a cyberthreat?
Introduction All of us are as individual as snowflakes in a winter storm … or so we think. Psychologists beg to differ, and in doing so, attribute five main personality types to human beings. ... Go on to the site to read the full article ... Read More
