A work colleague took an interest in BSides and asked if I could mentor him. I had gained a lot from the experience so I said “Yes!”
Author: ISBuzz Team
EndaceDAG Cards have been providing consistent, reliable, high performance packet capture for customers internally developed network visibility solutions.
Unlike traditional mobile security apps, which utilize a database of known malicious apps to screen for viruses and malware, viaProtect monitors all app.
The CSA is investing heavily on the SDP concept hoping it will solve some of the security challenges presented by cyber criminals, threats, and governments.
However, with each benefit comes a risk. And, what multiplies the risks are all the data that is created that have never existed before
Consist, a provider of IT security and compliance solutions in Germany, Switzerland, Spain and Israel, has signed a agreement with Lieberman Software
It seems that in the past, security professionals in law-abiding companies may have felt very alone.
Approximately 4 million malicious applications were used by cybercriminals to distribute mobile malware for Android-based devices.
How storytelling, cut through with some pragmatic IT security risk input, might change this conversation:
As RSA Conference 2014 got under way yesterday, Information Security Buzz complied a list of the some of the top rated speakers who are returning again.