When Interop gears up tomorrow in New York, you can bet your trade-show tchotchkes that software defined networking (SDN) will dominate airtime as one of the prevalent themes.
Author: ISBuzz Team
Last week, one of the partners in my firm (Bishop Fox) said something that really rang true: if you want to be a real penetration tester, you have to live it.
You may not be aware that there is a scale of seven deadly vices connected to social engineering.
London, UK (1 October 2013) – AlienVault, the leading provider of Unified Security Management™ solutions and crowd-sourced threat intelligence,
The Ministry of Defence revealed it is set to recruit hundreds of reservists as computer experts to work alongside regular forces in the creation of the new Joint Cyber Reserve Unit
The possibility of suspending EU-US trade talks, the idea of creating international standards of privacy protection and the need for genuine parliamentary oversight
Over 50 percent of Android-based smartphone and tablet owners do not use any security software to protect their devices against cyber-threats, according to Kaspersky Lab.
Cloud customers expect a certain level of service when they sign on to agreements. But a lot of the time, cloud services aren’t delivered as expected, and there isn’t even a way to verify that cloud services are performing as they should.
A computer fraud investigator has identified wealthy individuals as the target of a new online scam, which may use details of the mark’s family history to convince them an investment opportunity is genuine.
External data breaches (think: Anonymous) and internal data leaks (think: Edward Snowden) have enterprises questioning and rethinking their security programs.