Companies are becoming heavily focused on keeping up with the latest threats and securing their Virtualization infrastructures to increase efficiency
Most of all though, we need to tread carefully when deciding which tasks to hand over to the IoT – once we have given up control it may be hard to regain it
Websense, Inc. is a global leader in protecting organisations from the latest cyber attacks and data theft.
Kaspersky Lab’s heuristic detection protection subsystem has successfully blocked attacks via a zero-day vulnerability in Adobe Flash software.
It’s a common dilemma many cyber security professionals face when weighing the possibility of earning a new certification
From my 2+ decades of professional experience I’ve seen the following two information security practices to be the most important for adding security value
Hardware and software are like love and marriage and, to reference the old Sinatra classic, you can’t have one without the other.
Security management and compliance company, RandomStorm, is speaking at InfoSec Europe, which takes place at Earls Court, London on 29th and 30th April.
In my opinion, there is but one control that is key to all the others: Competence. Competence comes in a number of ways, including…
So, how do the seven deadly sins manifest themselves in IT security? More easily than you might think. Let’s take a look.