,

How to Hack a Credit Card in 6 Seconds, Experts Reveal

An article in “the-hacker-news” highlighting a fundamental flaw which enables credit cards to be hacked in 6 seconds.

,

Encrypting Data At Rest Or In The Cloud: Is It Value Adding?

Providing a non conventional view around the benefits of encrypting data at rest. Based on my personal experience of dabbling with implementations of encryption solutions for data at rest for a number of organisations in both the commercial and government sectors.

,

Patients’ Privacy: Lessons learned from major health care data breaches

A report about health care sector information security & patient privacy concerns and lessons needing to be learnt. Published by the independent Brookings Institution for research in Washington DC USA.

,

The Identity Underground

Criminals barter for your Social Security number and the most intimate details of your personal life.

,

Hacked companies still prioritise innovation over cybersecurity

A recent report by KPMG, (Aug-2016), highlighting that the majority of organisations still prioritise innovation over cybersecurity.