As the BYOD concept continues to ebb and flow, many companies spend a lot of time weighing out the benefits of instituting a ‘Bring Your Own Device’ policy with their employees.
Author: ISBuzz Team
When people think about securing their network, the term “identity and access governance” (IAG) might not come to mind. Most likely this is because they do not truly know what IAG is
Q2 Enhances Layered Fraud Protection with Easy Solutions; Companies Expand Partnership Easy Solutions, the Total Fraud Protection company and Q2 (NYSE: QTWO), a leading provider of secure virtual banking solutions for regional and community financial institutions, today a
These days, cyber crime is a lucrative business, and cyber criminals take their time to investigate their potential target before they go in for the steal to make the cyber attack as profitable as possible and to minimise the risk of getting caught. They look for weak spots in the corporate network and defences which they can exploit and really do their homework before they attack.
Overworked system administrators and their equally harried managers everywhere would love to hear from vendors that some SILVER BULLET security technology will keep them safe from all harm merely by plugging it in (and paying the vendor, of course).
Nation-state sponsored Cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex, modular tools, and keeping well under the radar of increasingly effective detection systems, Kaspersky Lab experts have discovered.
ESET Ireland advises Apple fans keen to get their hands on the Apple Watch to think before they click, after hackers exploited a wave of enthusiasm around the launch with a PHISHING scam linked to a fake giveaway.
Here to comments on the news of German Drug Bust is the security expert Ken Westin, senior security analyst for Tripwire.
Second Annual “Security Pressures Report” Measures Pressures from Advanced Malware Threats, to Resource Constraints to Executive Demands and More
Security industry insiders are beginning to review and assess the latest PCI Compliance Report published by Verizon. Here to comment on this Report are three expertrs in the field of Information Security: Luther Martin, chief security architect, HP Security Voltage, Andrew Wild, chief information security officer, Lancope and Richard Blech, CEO of Secure Channels.