Skip to content
  • Home
  • Domains
    • Application Security
    • BCP/DR
    • Breaches
    • Cloud Security
    • CISO
    • Cybercrime
    • Data protection
    • Data Privacy
    • Database security
    • DDoS
    • Deception
    • Endpoint security
    • Forensic
    • Hacking
    • GRC
    • Identity and access management (IAM)
    • IoT Security
    • Malware and Vulnerabilities
    • New Cyber Technologies
    • OT Security
    • Penetration Testing
    • Phishing
    • Ransomware
    • Security Architecture
    • Security awareness
    • Strategy and planning
    • Threat Intelligence
    • Web Security
  • InfoSec Deals
  • InfoSec Business Directory
    • List Your InfoSec Company
    • Search InfoSec Companies
  • InfoSec Expert Registration
  • My Account
Menu
  • Home
  • Domains
    • Application Security
    • BCP/DR
    • Breaches
    • Cloud Security
    • CISO
    • Cybercrime
    • Data protection
    • Data Privacy
    • Database security
    • DDoS
    • Deception
    • Endpoint security
    • Forensic
    • Hacking
    • GRC
    • Identity and access management (IAM)
    • IoT Security
    • Malware and Vulnerabilities
    • New Cyber Technologies
    • OT Security
    • Penetration Testing
    • Phishing
    • Ransomware
    • Security Architecture
    • Security awareness
    • Strategy and planning
    • Threat Intelligence
    • Web Security
  • InfoSec Deals
  • InfoSec Business Directory
    • List Your InfoSec Company
    • Search InfoSec Companies
  • InfoSec Expert Registration
  • My Account

Month: August 2014

Can a Data Breach Ever Have a Positive Outcome?

Norman Rohde, Vice President, Sales, EMEA, Novell, looks at how a data breach doesn’t always have to have a negative outcome.

WiFi Series Part 2 – Access All Areas

We still have a long way to go with BYOD, and there is a massive hill with regards to educating the public about using unsecured WiFi environments.

Sphonic Chosen by Betfair for Global Digital Identity and Know Your Customer Services

risk

Betfair has chosen London-based Sphonic for its innovative Identity & Risk Management solution and its KYC Know Your Customer) services.

University Helps Young Coders Uncover Innovative Ideas

code

Birmingham City University hosted Young Rewired State’s (YRS) Festival of Code back in July of 2014, which encourages young coders to hone their skills.

The IEEE Center for Secure Design Reveals Top Ten Most Significant Software Security Design Flaws

software_security

The IEEE Center for Secure Design has announced the release of a report titled “Avoiding the Top 10 Software Security Design Flaws.”

The Most Surprising Thing about CyberVor

cybervor

Reports of the CyberVor attack has shocked many readers, but what surprised us was that the number of hacked sites seemed low for an attack of this scale.

Rosetta Flash: An Adobe Flash Exploit Leveraging JSONP Callback

Google security researcher Michele Spagnuolo has developed a proof-of-concept tool called Rosetta Flash that reveals security problems with Adobe Flash.

Hire InfoSec Professionals or Security Certifications?

cissp

Ong Yew Chuan discusses how some have forgotten that security certifications indicate our professionalism and should therefore be treated with respect.

The Way of the Future – Securing the Internet of Things (IoT)

iot

The Internet of Things represents myriad new and exciting opportunities, but the IoT relies on networks, and those networks need to be protected.

Disaster Recovery Solutions: A Core Component of Multilayered Protection

disaster_recovery

Disaster recovery (DR) technologies should be considered an integral component of multilayered protection for both your data and your uptime.

← older

Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics

Twitter Facebook-f Linkedin Youtube

Working With Us

  • About Us
  • Advertise With Us
  • Information Security Companies Directory
  • List Your Company On Information Security Directory (LTD)
  • Search Information Security Companies
  • Contact Us

The Pages

  • Privacy Policy
  • Terms & Conditions
  • RSS Feeds

Our Contributing Experts

  • Information Security Expert Community (1000+)
  • Register as an Expert and Contribute
  • Submit Security Article

Copyright © 2022 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is in Harrison, ACT 2914.

Information Security Buzz