Articles

New proof-of-concept malware demonstrates virus for OS X

Security researchers have found a proof-of-concept attack that appears to be the first true viral malware approach for compromising OS X. The malware is called...

Did Kim Dotcom invent 2-factor authentication? Er, not exactly..

Twitter is the latest major web service to beef up its security two-factor authentication (2FA). The security feature is a pretty simple and effective approach...

Security Twitteratti: Twitter’s 2FA does sweet FA for biz

Security-watchers don't appear overly impressed with Twitter's introduction of two-factor authentication (2FA) to its service. While some infosec experts welcomed the move, others argued that...

Six Simple Steps to Enterprise Risk Management

Enterprise risk management is a scalable, holistic approach to improved decision-making that consolidates and organizes risk information from across an organization. No longer limited to a risk manager’s monthly report, ERM is becoming a fundamental part of business success.

By embracing ERM and creating a risk management culture, organizations can drive business performance, innovation and growth, while protecting company reputation and shareholder value. For many businesses, demonstrating that they have a clear, auditable risk management process has become a critical factor in winning new business. Unfortunately, too many business leaders still perceive risk management as a complex undertaking.
In reality, there are six simple steps to follow for effective risk management, – regardless of the industry, vertical, size or scope of the project or company.

Lulzsec hacker group handed jail sentences

Lulzsec hacker group handed jail sentences LulzSec hacker Jake Davis: 'The internet is a world devoid of empathy' British hackers who were behind a series of...

What is an Advanced Persistent Threat (APT)

Advanced persistent threat (APT) is commonly used to refer to cyber threats, in particular that of Internet-enabled espionage using a variety of intelligence gathering...

Facebook Security Infographic

In this infographic you can find out more about our security infrastructure and an overview of the tools available to all our users to...