As more details surface on the lengths the National Security Agency (NSA) has gone in the professed name of stopping terrorist threats, the incidents only reinforce the need to embrace a stronger standard for encryption, security experts share.
Author: ISBuzz Team
I’ve been quiet of late — mostly because our Lawfare readership is so self-evidently (and, I might add, appropriately) engaged in questions of greater immediacy relating to the coming debate over Syrian intervention.
There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults.
As more and more information about the NSA’s global surveillance capabilities emerges through leaks of material obtained by Edward Snowden
According to Verizon’s 2013 State of the Enterprise Cloud report, the enterprise use of cloud technology grew by 90 percent between Jan 2012 and June 2013.
Though many enterprises invest in security testing ranging from automated vulnerability scans to full-out penetration testing, in rare instances do organizations do root cause analysis
In connection with my privacy and data security training business, TeachPrivacy, I was recently asked whether I had a list of the various laws, regulations, and industry codes that require privacy and/or data security training.
On the Cryptography mailing list, John Gilmore (co-founder of pioneering ISP The Little Garden and the Electronic Frontier Foundation; early Sun employee; cypherpunk; significant contributor to GNU/Linux and its crypto suite
While malware developers keep working on improving their creations by leveraging non-HTTP channels, such as peer-to-peer, most malicious programs still use HTTP.
Over the last few months, you undoubtedly have heard a lot of crazy sounding stuff in the news, from National Security Agency (NSA) leaks from Snowden, cryptography, hackers, threats, vulnerabilities, and more.