If you are worried about the increased risk of hactivist attacks this week on 9/11, Tripwire can offer security tips for businesses from a few of their security experts
Author: ISBuzz Team
Over the past few days, a large number of HootSuite accounts have been hacked and abused to spread links to shady miracle diet websites.
Malicious emails, craftily disguised as breaking news from CNN that the U.S. is bombing Syria, are making the rounds online, researchers warn.
As more details surface on the lengths the National Security Agency (NSA) has gone in the professed name of stopping terrorist threats, the incidents only reinforce the need to embrace a stronger standard for encryption, security experts share.
I’ve been quiet of late — mostly because our Lawfare readership is so self-evidently (and, I might add, appropriately) engaged in questions of greater immediacy relating to the coming debate over Syrian intervention.
There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults.
As more and more information about the NSA’s global surveillance capabilities emerges through leaks of material obtained by Edward Snowden
According to Verizon’s 2013 State of the Enterprise Cloud report, the enterprise use of cloud technology grew by 90 percent between Jan 2012 and June 2013.
Though many enterprises invest in security testing ranging from automated vulnerability scans to full-out penetration testing, in rare instances do organizations do root cause analysis
In connection with my privacy and data security training business, TeachPrivacy, I was recently asked whether I had a list of the various laws, regulations, and industry codes that require privacy and/or data security training.