Paul Rubens Avatar
  • Unlocking Smartphones: PINs, Patterns or Fingerprints?

    Losing your smartphone can result in a catastrophic security breach. After all, these devices are potential treasure troves of confidential corporate and personal information waiting to be exploited by anyone who comes across them. Because of this a mobile device security industry has sprung up over the last few years, offering everything from simple data […]

  • Why Is Fighting Cybercrime So Hard?

    A few hundred expert hackers offering “crime as a service” are behind a large percentage of all the cybercrime acts committed. That’s the conclusion of a group of international law enforcement experts from organizations including the FBI and the UK’s National Crime Agency. Talking at the recent InfoSec Europe security conference in London, FBI agent […]

  • The Trouble with Tor

    For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source technology, to protect U.S. government communications. It is used by people living under restrictive regimes who want to access forbidden information or […]

  • How Secure is Apple Pay?

      Apple Pay was launched on Oct. 20 and, thanks to all the media excitement, you could be forgiven for thinking that it was the first mobile payment system to be introduced to the world. In fact there are plenty of others, most notably Google Wallet and Softcard. Another system, called CurrentC, is being developed […]

  • VeraCrypt a Worthy TrueCrypt Alternative

    When the TrueCrypt encryption software project was abandoned two years ago, it left many folks looking for an open source encryption system. VeraCrypt appeared on the scene as a TrueCrypt alternative. VeraCrypt is a fork of the original TrueCrypt code, and the project is run and managed almost single handedly by French IT security consultant […]

  • 3 Tools for Enforcing Password Policies

    Recent corporate security breaches have taught us something important: The average computer user is spectacularly bad at choosing good passwords. The most popular passwords turn out to be simple, easy-to-remember ones, like “password,” “123456,” “monkey” and “iloveyou,” all of which provide little security. If you can remember your password, then it is probably not secure. […]

  • Digital Certificate Dangers, and How to Fight Them

    Digital certificates play a vital security role on the Internet. They allow you to prove that your websites are genuine, sign applications and software updates to prove that they originated from you, and communicate with customers easily using encryption. The drawback to certificates is that if anything goes wrong, the potential fallout can be disastrous. […]

  • 6 Emerging Security Threats, and How to Fight Them

      The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched. So it’s important to be aware of the threats to enterprise security that are coming over the horizon and heading this way. It’s a question the Georgia Institute of Technology addresses […]

  • Anti-Virus Isn’t Enough: 7 Steps to Discourage Hackers

    When hackers broke in to the New York Times’ network, evaded its anti-virus software and began plundering its computer systems, it highlighted a rather uncomfortable truth: ?Anti-virus software is not that good at keeping systems secure. That means that any company that relies on an anti-virus package to secure its endpoints is exposing itself to […]

  • How to Prevent Security Breaches from Known Vulnerabilities

    Why are hackers able to breach the security of so many organizations using known vulnerabilities, and what can you do minimize the risk that this happens to you? It’s an important question to ask, because consequences can be significant if a security breach leads to the theft of confidential proprietary data or loss of customer […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis