Many in the industrial cybersecurity space have long pressed for faster action on the part of stakeholders. Over recent years, however, much of this emoting has seemed to fall on deaf ears.
Author: ISBuzz Team
One aspect of BYOD that we don’t often talk about is its potential to reduce operating costs.
Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical infrastructures of the country.
Following a pilot project aimed at providing UK government and business with an effective cyber incident response capability, GCHQ (in the form of CESG and CPNI) has launched two schemes
A man using the British Library’s wi-fi network was denied access to an online version of Shakespeare’s Hamlet because the text contained “violent content”.
In-browser security specialist Trusteer has published a white paper – Stepping Up the Battle Against Advanced Threats – and which says the endpoint has become the path of least resistance for cybercriminals
It may be possible for a “single dedicated attacker” to run an internet “carpet-bombing” attack by applying Big Data and distributed computing technologies, security researcher Alejandro Caceres warns.
Last week, FBI raids on Freedom Hosting and child porn distributors took down Tor Mail, a secure email provider for users of the Tor network.
The “Comment Crew,” a group of China-based hackers whose outing earlier this year in major media outlets caused a row with the U.S., have resumed their attacks against dissidents.
A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and governance measures