This year, cloud computing is definitely poised to gain importance among enterprises.
Author: ISBuzz Team
The Snowden incident where, according to the New York Times (21Jun2013), a government intelligence worker was able to easily copy and disseminate large amounts of highly sensitive and classified data
DOSarrest Internet Security announced today that it will begin offering a website Vulnerability Testing and Optimization (VTO) service.
Information security has always required specialised knowledge – not least to decipher all the acronyms and geek speak!
I have spent the last 18 months pondering on the whole sphere of identity and authentication and a number of things have happened:
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed. Microsoft will stop releasing security updates for the OS on that date.
Cloud computing is growing, both as an external business tool and as a way to better manage IT in the enterprise.
Most of the data breach incidents analysed by the Information Commissioner’s Office (ICO) in a three-month period earlier this year concerned errors in the way personal information was disclosed, the watchdog has said.
The Central Tibetan Administration website has been hacked to serve up a Java exploit that drops advanced malware, marking the latest attempt to compromise people hoping for freedom from Chinese control in the province.
How much Internet traffic is being actively intercepted and reviewed by the National Security Agency (NSA)?