Although federation divides the work between an identity provider (IdP) and a service provider/relying party (SP/RP)
Author: ISBuzz Team
In response to the news that another Bitcoin company has been hacked and $1 million was stolen, Amichai Shulman, CTO of Imperva has the following comments:
In 2014, Zscaler sees these two major trends – the evolution of advanced threats and the complexity of cloud and mobile environments
CyberSponse, Inc has joined the ICS-ISAC as a supporting member and is providing its secure intelligence threat defense management platform
This whitepaper examines the implications of the new PCI DSS Version 3.0 for businesses and looks at how the requirements can help to minimise the threat of card data theft
WASHINGTON—Cyber security experts stated on Tuesday that HealthCare.gov should be temporarily shut down in anticipation of ongoing cyber security concerns.
Tripwire, Inc., announced the results of research on risk-based security management in the healthcare and pharmaceutical industries.
According to a post on the Russian cybercrime forum, i2Ninja offers a similar set of capabilities to the ones offered by other major financial malware:
‘What 2 things are most likely to change the security industry in the next 2 years? And why?’ Kai Roer, The Roer Group, Senior Partner
Cloud and BYOD are all converging on security professionals like ants to a picnic. So many of the traditional tools and methodologies the security industry