
Four steps to implementing a big data program in the cloud
Big data projects don’t exist in a vacuum. Your big data infrastructure elements should have…

Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations
Cybercriminal activities have always involved the abuse of legitimate online tools and services. Examples of…

(ISC)² Partners with ST Electronics to Offer Globally Recognised SSCP Training in Singapore
First ever SSCP training offered with hands-on practical using cyber range to help security practitioners defend…

Why you should use a ‘robo-hacker’ before launching a bug bounty program
Companies with a heavy online presence often employ so-called ‘white-hat’ hackers to discover vulnerabilities in…