Security professionals are the paranoid type anyway and I’m pretty sure they questioned this before, but now their paranoia can be justified.
Author: ISBuzz Team
In response to the news that Yahoo has announced plans to encrypt all internal traffic following the National Security Agency disclosures by Edward Snowden
Proper session management is an ongoing challenge for mobile application developers. It’s not uncommon for mobile apps to have multiple session management errors, putting the application at risk.
Shadow IT, the latest phrase for the informal layer of IT built and used inside your organisation that you have almost no control over.
Information Security, over the next two years will be shaped by a natural progression from Big Data to Deep Data and an ever-increasing focus by governments on Cyber Security.
For security to be successful, it must be integrated. To be integrated, the value it offers must resonate on an individual basis while aligned with the needs of the organization.
After 9-11, privacy got shafted in the rush to build tougher security, but we’ve seen how that has led to governments abusing authority.
Under a project codenamed MUSCULAR, the NSA sought to work around the restrictions of PRISM, another NSA info-sharing program
Q1. What are the key changes in the ISO 27001: 2013 revision, as well as the benefits?
Microsoft is planning to increase its use of encryption in a bid to thwart the pervasive internet surveillance being practised by the NSA and the UK’s GCHQ