A survey of 300 information security professionals in Europe finds companies unwilling to make data breaches public
Author: ISBuzz Team
I think I detected a discernible sigh of relief this week from billions of Internet users with 56-character passwords.
Our Post colleagues have had a busy day. First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down.
We have a very topical Hacker Hotshot event this Wednesday with Andrew Jaquith (CTO and SVP Cloud Strategy of SilverSky) titled: “4 Email Security Policy Tips That Can Stop Sensitive Information Leakage”.
Information security practitioners know all too well that garnering the support of senior management, can significantly benefit, and advance, their long-term application security objectives for the organization.
Most people reading this article will not remember when these famous words were first broadcast. It was at the end of a speech by Winston Churchill on February, 9th 1941. What he said was this:
Over the last few years CSOs are quickly coming to the realization that they have a tsunami of SaaS apps they have to manage, and they are recognizing that the cloud poses unique security requirements
When aspiring pilots go through flight school, they learn both in a conventional ground setting and using a flight simulator. On the simulator, new pilots are immersed in the experience of flying
During the summer months many of us look forward to a couple of weeks away from the office. However, in reality, complete radio silence from those left behind is not always an option.
RSA® Conference Europe 2013 has moved this year to the Amsterdam RAI in The Netherlands. Join us and immerse yourself in hot topics, insider knowledge and practical advice from information security experts.