The security industry is a bit like an episode of Star Trek in that it’s pretty formulaic. A bad guy appears and cuts through the defenses,
Author: ISBuzz Team
Amit Klein, CTO at Trusteer, an IBM company, has compiled what Trusteer sees to be the most dangerous malware trends for 2014. See his comments and an infographic below
SSL expiration has been making headlines lately with Netcraft recently reporting over 200 certificates have expired in relation to the US government shutdown.
‘What 2 things are most likely to change the security industry in the next 2 years? And why?’
We will need folks who can recognize new information security and privacy risks, there is no textbook to look to as risks evolve.
One such example is to take a straw poll to understand the number of IP connected devices those in the audience have at home, for the record the most anyone has ever answered is 71 (you know who you are!).
By combining our best-of-breed privileged identity access control with Securonix’ advanced risk and threat analytics, we deliver real value
Who will get swept away and who will discover new lands? Here’s what’s happening in IAM these days and why federating the identity layer
The landscape is no longer just about “keeping the bad guys out”, but more about “catching the bad guys quickly when they’re in”, and learning from it.
Organizations will see more and more business benefits of information security which will, of course, make information security projects easier.