In 2014, Zscaler sees these two major trends – the evolution of advanced threats and the complexity of cloud and mobile environments
Author: ISBuzz Team
CyberSponse, Inc has joined the ICS-ISAC as a supporting member and is providing its secure intelligence threat defense management platform
This whitepaper examines the implications of the new PCI DSS Version 3.0 for businesses and looks at how the requirements can help to minimise the threat of card data theft
WASHINGTON—Cyber security experts stated on Tuesday that HealthCare.gov should be temporarily shut down in anticipation of ongoing cyber security concerns.
Tripwire, Inc., announced the results of research on risk-based security management in the healthcare and pharmaceutical industries.
According to a post on the Russian cybercrime forum, i2Ninja offers a similar set of capabilities to the ones offered by other major financial malware:
‘What 2 things are most likely to change the security industry in the next 2 years? And why?’ Kai Roer, The Roer Group, Senior Partner
Cloud and BYOD are all converging on security professionals like ants to a picnic. So many of the traditional tools and methodologies the security industry
The security industry is a bit like an episode of Star Trek in that it’s pretty formulaic. A bad guy appears and cuts through the defenses,
Amit Klein, CTO at Trusteer, an IBM company, has compiled what Trusteer sees to be the most dangerous malware trends for 2014. See his comments and an infographic below