Proper session management is an ongoing challenge for mobile application developers. It’s not uncommon for mobile apps to have multiple session management errors, putting the application at risk.
Author: ISBuzz Team
Shadow IT, the latest phrase for the informal layer of IT built and used inside your organisation that you have almost no control over.
Information Security, over the next two years will be shaped by a natural progression from Big Data to Deep Data and an ever-increasing focus by governments on Cyber Security.
For security to be successful, it must be integrated. To be integrated, the value it offers must resonate on an individual basis while aligned with the needs of the organization.
After 9-11, privacy got shafted in the rush to build tougher security, but we’ve seen how that has led to governments abusing authority.
Under a project codenamed MUSCULAR, the NSA sought to work around the restrictions of PRISM, another NSA info-sharing program
Q1. What are the key changes in the ISO 27001: 2013 revision, as well as the benefits?
Microsoft is planning to increase its use of encryption in a bid to thwart the pervasive internet surveillance being practised by the NSA and the UK’s GCHQ
Unique FIPS certified and PIN activated USB flash drive datAshur recognised for robust security at the 2013 BCS & Computing UK IT Industry Awards London
AlienVault announced that it has been named a finalist in the 2013 Techworld Awards and the 2014 SC Awards U.S.