Companies must start employing a proactive, as opposed to reactive, approach when it comes to preparing for targeted cyber attacks.
Author: ISBuzz Team
Users’ access rights, specifically instances of insider misuse, have become a weak point in security policies for a majority of organisations.
Introducing 2FA as a simple username and password combination is no longer enough to guarantee an adequate level of security.
Databarracks has revealed a significant disparity between organisations’ attitudes and approaches to business continuity (BC) and disaster recovery (DR).
People solve problems all the time, but when it comes to risk management, relying on a person is no substitute for a process.
Yonni Shelmerdine of Lacoon identifies a number of critical takeaways with respect to the iCloud hack.
Love it or hate it, the PCI DSS standard was the first to outline clear, tactical steps to secure credit card data.
IoT provides the opportunity for managed services to dramatically improve their service interactions, gain more information about the users
What would happen if the very Android devices managed by the MDM were to be successfully compromised? Could this mean the end of BYOD?
Magnetic tape was first used to store computer data in 1951. By the mid 1970s pretty much everyone relied on tape cassettes and cartridges.