The Cloud Security Alliance have announced the release of two key documents related to the CSA’s Software Defined Perimeter (SDP)
Author: ISBuzz Team
Despite the increased share of phishing attacks on online stores, the most frequently attacked category of organisation was still social networking sites
Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward.
Enterprise Strategy Group Survey Details the Need to Effectively Monitor the Modern Network Environment
Companies are becoming heavily focused on keeping up with the latest threats and securing their Virtualization infrastructures to increase efficiency
Most of all though, we need to tread carefully when deciding which tasks to hand over to the IoT – once we have given up control it may be hard to regain it
Websense, Inc. is a global leader in protecting organisations from the latest cyber attacks and data theft.
Kaspersky Lab’s heuristic detection protection subsystem has successfully blocked attacks via a zero-day vulnerability in Adobe Flash software.
It’s a common dilemma many cyber security professionals face when weighing the possibility of earning a new certification
From my 2+ decades of professional experience I’ve seen the following two information security practices to be the most important for adding security value