NTOMobile is priced on a per year per application basis and supports the scanning of the mobile client application using a combination of source code
Author: ISBuzz Team
Company acquisitions can have a devastating impact on information security and management, with the employees of acquired firms more preoccupied
At its simplest, eDiscovery is a term used to describe actions taken to collect, sort, identify and understand information stored on computers
Salesforce.com, Gmail, and Google Docs are examples; your data isn’t on your computer—it’s out in the “cloud”, and you access it from your web browser.
The only question they had was ‘who had leaked this information from the plant’ a question I can attest was never satisfied.
Banking Trojans, including the notorious Zbot, Carberp and SpyEye programs, accounted for two-thirds of financial malware
Dubbed Heartbleed, the vulnerability compromises encryption between users and web servers using older versions of OpenSSL
The challenge for leaders is to create a BYOD strategy that allows employees to accomplish more work while protecting sensitive information from data theft.
54 percent of companies in the UK are using incorrect metrics when trying to determine their IT security status
Siemens and McAfee plan to extend their partnership to enhance the security offerings for industrial customers to protect against cyber threats.