The OPM hack explained: Bad security practices meet China's Captain America
How the OPM hack happened, the technical details, and a timeline of the infiltration and response.
View Article10 things you should know about dark web websites
Catch a glimpse of what flourishes in the shadows of the internet.
View ArticleWhat is a CISO? Responsibilities and requirements for this vital leadership role
The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.
View ArticleWhat is digital forensics? And how to land a job in this hot field
Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a...
View ArticleWhat is a honeypot? A trap for catching hackers in the act
A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.
View ArticleWhat is opsec? A process for protecting critical information
Opsec, which stands for operations security, is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever...
View ArticleWhat is PKI? And how it secures just about everything online
Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web...
View ArticleWhat is a Trojan horse? How this tricky malware works
A Trojan horse is a type of malware that can wreak havoc on computer networks — but only with your unwitting help.
View ArticleWhat is a computer virus? How they spread and 5 signs you've been infected
A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
View ArticleWhat is a computer worm? How this self-spreading malware wreaks havoc
A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer.
View ArticleMarriott data breach FAQ: How did it happen and what was the impact?
In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers,...
View ArticleHow EDR stops hackers in their tracks
EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behaviour.
View ArticleWhat is cybersecurity? Definition, frameworks, jobs, and salaries
Cybersecurity is the practice of defending computers, networks, and data from malicious electronic attacks. Learn the skills, certifications and degrees you need to land a job in this challenging field.
View ArticleWhat is information security? Definition, principles, and jobs
Information security is a set of practices intended to keep data secure from unauthorized access or alterations. Here's a broad look at the policies, principles, and people used to protect data.
View ArticleWhat is a false flag? How state-based hackers cover their tracks
False flags are a favourite technique of cyber attackers connected to Russian intelligence, but they don't have a monopoly on the practice.
View Article
More Pages to Explore .....