With the consumerisation of IT continuing to gather pace across businesses of all sizes, technology in 2015 will need adapt to keep up with this trend.
Author: ISBuzz Team
Ilia Kolochenko, CEO of High-Tech Bridge, discusses how any website, even a personal blog, can be sold on the black market.
Intralinks recently published new research with the Ponemon Institute into the security threats and data loss caused by unsanctioned file sharing.
Phil Beckett, partner at Proven Legal Technologies, considers the rise in cyber security threats and what firms must do to protect themselves.
The internet is a vast, unregulated space where e-criminals are able to promote and sell imitation goods on an immense global scale.
Before migrating a database to the cloud, it is critical to understand the scope of this action, including what data should be moved where.
Recently, Corero Network Security identified a change in the way attackers are using DDoS as a mechanism to target their victims’ networks.
AlienVault Labs has been tracking a cyber espionage group from Russia for years. Here’s what we know about it.
According to a survey carried out jointly by B2B International and Kaspersky Lab, 13 percent of Internet users do not believe that cyber threats are real.
NeoMam Studios reveals that many IT pros are either unaware of the threats to cloud security or are not taking sufficient action to minimise them.