Feature

How secure is cloud storage?

Cloud storage has become wildly popular over the last decade. Gone are the days when you had to worry about losing your data if your phone, laptop or PC stopped working - you can now securely back up everything to the cloud so it’s always there, available whenever and wherever you want it.

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.

What is DNS and how does it work?

The Domain Name System resolves the names of internet sites with their underlying IP addresses adding efficiency and even security in the process.

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

5 myths of API security

In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces.

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

CISOs will have increasing influence on the top management: Biju K, Federal Bank

Businesses across the globe have started to see information security as a business priority and this alignment has enhanced the influence of CISOs on top management, says Biju K, Chief Information Security Head of Federal Bank.

In the face of rampant threats, learn, implement and adapt: S Srikanth, TVS Motor

People need to understand the business and reputational impact of a data breach, says S. Srikanth, head of information security at TVS Motor Company.

11 ways ransomware is evolving

Ransomware creators are getting more sophisticated in how they infect systems, avoid detection, and foil decryption efforts.

Want to hack a voting machine? Hack the voting machine vendor first

How password reuse and third-party breaches leave voting machine vendors vulnerable to attack.

1.4B stolen passwords are free for the taking: What we know now

The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords.