Image from

HP cloud service gives applications ability to protect themselves

With security breaches mounting in what can only be described as a terrible year for IT security, vendors are coming...

September 9th, 2014 Howard Solomon

Video interview: Check Point Software’s Amnon Bar-Lev

Video interview: Check Point Software’s Amnon Bar-Lev

Let’s face it: 2014 has been a miserable year for IT security professionals. Every week, it seems, an organization somewhere...

August 26th, 2014 Howard Solomon

Image from

U.S. warns on POS systems

Canadian CSOs in the retail sector need to be aware of a warning issued Friday by US-CERT that the Backoff...

August 25th, 2014 Howard Solomon

Image from

Another warning about Android apps

A security vendor has raked the Google Play store and the Android ecosystem over the coals for allowing apps that...

August 21st, 2014 Howard Solomon

Password graphic SHUTTERSTOCK

Reveton ransomware now steals passwords and credentials

Ransomware is one of the uglier threats that security professionals have to deal with. Unfortunately there's a new version in...

August 20th, 2014 Howard Solomon

Image from

Six tips to end SQL Injection attacks

These tips are just the tip of the iceberg for what you need to do to stop SQL Injection attacks....

August 12th, 2014 Howard Solomon

Graphic via Shutterstock

New malware exploit kits flooding market, says Cisco

Cybercrime works pretty much the same way as a capitalism does: where there’s a need for a product or service,...

August 5th, 2014 Howard Solomon

Image from

Elasticsearch vulnerability leads to DDoS malware on Amazon

Security professionals usually don't have to worry about the search engines their organizations chose for plowing through corporate data. But...

July 28th, 2014 Howard Solomon

Browser Internet Explorer 11

Attackers turn to IE: Report

Know your enemy is a good defence for any country, or enterprise. So here's more advice for CSOs from another...

July 27th, 2014 Howard Solomon