RansomWeb: Emerging Website Threat that May Outshine DDoS, Data Theft and Defacements
Ilia Kolochenko of High-Tech Bridge weighs in on the growing threat of ransomweb attacking businesses’ website server.
Why You Could Really Do with Setting Up a VPN

An infographic from WhoIsHostingThis? provides a detailed look into VPNs and explains how to go through the relatively easy process of setting one up.
Cyberbullying and Inappropriate Behaviour Are Education’s Biggest Social Media Fears

Bloxx has found that the biggest concerns education IT executives have about social media are cyberbullying (71%) and inappropriate behaviour (71%).
Lizard Squad Strikes Again – Nexusguard Comment

Bill Barry of Nexusguard comments on Lizard Squad’s hack of Taylor Swift’s Twitter account.
Making The Year of the Retail Breach a Thing of the Past

Sandeep Kumar of ForeScout discusses how implementing a next-gen network security solution capable of continuous monitoring can help prevent a breach.
How to Defend Your Data

An infographic reviews the forces that threaten the security of our data, and it investigates the ways we can protect it more effectively.
Data Privacy Day 2015 – Expert Comments

Information security experts comment on International Privacy Day 2015 and the increasing need to protect users’ data.
Companies Need to Stop Divorcing Themselves from Cyber Security, Says APM Group

Richard Pharro of APM Group weighs in on findings that many of the data breaches of 2014 were caused by internal intrusions or employee “human error”.
Security and the State of Application Delivery
Brian A. McHenry of F5 Networks discusses how security is beginning to match availability and performance when it comes to application delivery.
Qualys Releases Security Advisory for GHOST Vulnerability on Linux Systems

Qualys, Inc. has announced that its security research team found a critical vulnerability in the Linux GNU C Library (glibc) called GHOST.