The phenomenon of the Internet of Things (IoT) is positively influencing our lives by augmenting our spaces with intelligent and connected devices.
Author: ISBuzz Team
As the security community continues to look for easier ways to mitigate the risk of all-too-common Cross-Site Request Forgery (CSRF) attacks
IBM has teamed with more than 1,000 universities worldwide with the intent of building a future “pipeline” of data scientists.
Ladar Levison took 10 years to build his company—and he’s 32, so that’s most of his adult life. So when he shut down his encrypted e-mail service, Lavabit, without warning last week, it was like “putting a beloved pet to sleep.”
Many in the industrial cybersecurity space have long pressed for faster action on the part of stakeholders. Over recent years, however, much of this emoting has seemed to fall on deaf ears.
One aspect of BYOD that we don’t often talk about is its potential to reduce operating costs.
Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical infrastructures of the country.
Following a pilot project aimed at providing UK government and business with an effective cyber incident response capability, GCHQ (in the form of CESG and CPNI) has launched two schemes
A man using the British Library’s wi-fi network was denied access to an online version of Shakespeare’s Hamlet because the text contained “violent content”.
In-browser security specialist Trusteer has published a white paper – Stepping Up the Battle Against Advanced Threats – and which says the endpoint has become the path of least resistance for cybercriminals