Articles By Howard Solomon

Image by Allanswart from

Deception technology enhances honeypots for cyber defence

Intellectual property can be as valuable as gold for some companies. And for those firms, leading-edge cyber security can also...

February 5th, 2016 Howard Solomon

Why software teams need disciplined structure to reduce security bugs

An athletics footware manufacturer has a slogan that says, "Just do it." It's also a command that leaders of some...

February 4th, 2016 Howard Solomon
Image from

Study dismisses police worries encryption will end their surveillance capabilities

Changes in technology -- including the increased use of commercially-available encryption by criminals and terrorists -- has partly made it...

February 3rd, 2016 Howard Solomon
Image by Brilt from

NASA breach shows again that brute force password attacks work

It isn't uncommon for hackers to boast about their exploits; it adds a bit of credibility to their work. So...

February 2nd, 2016 Howard Solomon
Red Privacy Button Keyboard

Canadian privacy expert critical of spy agencies’ handling of metadata

Privacy expert Ann Cavoukian has criticized the federal government for not better protecting the telecommunications metadata two Canadian intelligence agencies...

February 1st, 2016 Howard Solomon
cloud security

Make finding security solutions to Shadow IT a priority, CISOs warned

CISOs have to be more open to new security solutions to meet the challenge of staff signing up for cloud...

January 29th, 2016 Howard Solomon
Red Privacy Button Keyboard

Data Privacy Day: Eight tips to improve your organization’s profile

For CISOs, every day is data privacy day. But every January 28th Data Privacy Day is officially observed by a...

January 28th, 2016 Howard Solomon
feature new HP laser jet printers

How networked printers could be used as FTP servers by hackers

Infosecurity pros know that anything that connects to the Internet can be a security risk unless properly configured. This week...

January 27th, 2016 Howard Solomon
executives in a business meeting

It’s time for CISOs to take security training to the next level

With spear phishing attacks increasingly being used to spread malware and ransomware, security awareness training has never been more important....

January 26th, 2016 Howard Solomon
Suitcase with Cash

22 tips for preventing ransomware attacks

The explosion of ransomware in the past year has many infosec professionals worried because of the devastation it can wreak...

January 25th, 2016 Howard Solomon