The IT staff can play a crucial role in transitioning today’s workers away from old-school passwords to modern day passphrases.
Author: ISBuzz Team
Greg Mancusi-Ungaro offers three tips that corporations should take to minimize their customer’s exposure to phishing attacks following a breach.
As businesses gain more experience with the threats associated with BYOD, they’re hard-pressed to find solutions that deal with them.
Kai Roer, a Senior Partner at the Roer Group, offers his tips on how to successfully build a positive security culture.
Given modern-day costs and reputational damage that result from a data breach, it is important for organizations to protect against insider threats.
It’s time to shift the conversation about PCI audits from pass/fail to considering smarter, more efficient methods of information security.
Norman Rohde, Vice President, Sales, EMEA, Novell, looks at how a data breach doesn’t always have to have a negative outcome.
Betfair has chosen London-based Sphonic for its innovative Identity & Risk Management solution and its KYC Know Your Customer) services.
Birmingham City University hosted Young Rewired State’s (YRS) Festival of Code back in July of 2014, which encourages young coders to hone their skills.
The IEEE Center for Secure Design has announced the release of a report titled “Avoiding the Top 10 Software Security Design Flaws.”