Those perturbed about this week’s news that government spies may be perusing all sorts of personal communications might be particularly enthusiastic about the work of Purdue researchers in developing a time cloak to hide data.
Author: ISBuzz Team
There is no ‘safe haven’ for investors when it comes to data security and the onus is on them to scrutinise management.
There’s been a big push around the globe to ramp up data retention rules, which require various online services to keep all sorts of data on their users for a long time, just in case it’s possible that law enforcement officials might need that data at some later date.
The simultaneous explosion of enterprise mobility and cloud adoption has resulted in a “perfect storm” for IT. It’s the “everywhere data” side effect created by bring your own device (BYOD) programs — data is now coming from anywhere and everywhere, making it hard for IT departments to keep up.
Teenagers from 14 to 16 will pit their wits against one another to break secret codes to uncover hidden messages and then write their own
Sometimes people ask me for career advice related to information security in general and, more specifically, digital forensics and incident response.
On Sunday, the New York Times quoted senior US officials as saying the Obama administration began helping its Middle Eastern friends build up cyber defenses against alleged attacks form the Islamic Republic.
Only terrorists, criminals and spies should fear secret activities of the British and US intelligence agencies, the Foreign Secretary has insisted.
Last week, US President Barack Obama met with his Chinese counterpart Xi Jinping.
The clock is ticking as web applications take center stage as the point of entry for malicious activity and development teams are asked to deliver new applications at breakneck speed.