Big Data analytics in information security is critical as it replaces the practice of reacting to incidents with the need to predict, understand and respond to complex events, says Steve Durbin of Information Security Forum.
Author: ISBuzz Team
Cyber hackers have already shown what damage they can do, but this may be the scariest hacking story yet, if it came true.
As more employees continue to access consumer cloud accounts at work (regardless of IT rules), the enterprise world is about to reach a breaking point, based on a new report.
Which are you more concerned about from an internet security stand point, honestly? Your Facebook account or your bank account? According to a recent study conducted at Forbes, if you answered ‘your bank account,’ you are wrong.
When Black Hat’s annual security conference rolls into Las Vegas at the end of July, event organizers promise one of the most “content-heavy” installments yet.
This is the first of a two-part series on the techniques and tradecraft of ethical hackers. The second part will appear later this week.
This year Verizon’s database grew substantially from 855 confirmed data breaches to more than 47,000 reported security incidents and 621 confirmed data breaches.
Oracle has faced an uphill battle when it comes to Java and security. As soon as a series of fixes are released, someone somewhere (usually a researcher) discovers another flaw, and the cycle begins anew – and it’s painful. Now, Oracle plans to fix that by heavily investing in Java’s security.
In his Opinion on the EC’s proposed legal framework for Europol, the European Data Protection Supervisor states that strong data protection principles – of the sort that would prevent the UK’s Communications Data Bill – would improve rather than weaken law enforcement.
Christian is this month’s Premier 100 IT Leader, answering questions about the major issues IT should be addressing in the coming year and career paths.