Modern Listing Example
Time for Open Source Intelligence and the 'Deep Web'
By Tyson Johnson, Vice President of Business Development, BrightPlanet “Deep Web” is a vague description…
How to be a Prepper (aka How to Survive a DDoS Attack)
By Mark Webb-Johnson Distributed Denial of Service (DDoS): The unthinkable. The thing that puts terror…
Are you prepared to manage a security incident?
By Gary Sidaway, Global Director of Security, Strategy, NTT Com Security It’s the year of…
The Upside of Heartbleed
By Derek Morwood, Regional Sales Manager for Centrify The Heartbleed bug has generated a lot…
Exposing the Luuuk banking fraud campaign
Experts at Kaspersky Lab’s Global Research and Analysis Team have discovered evidence of a targeted…
Women in Security: Flash forward
By Adeline Teoh A flash flood changed Kate Fitzgerald’s career direction and now the emergency…
We can fly, we can spy and we can collide: Solving the RPAS security challenge
By Joe Urli, Brad Mason and Peter La Franchi Lightweight remotely piloted aircraft systems (RPAS),…
Education – An underused tool in managing organisational security risks
By Andy Davis Organisations are failing to train their employees to help protect themselves and…