Acumin speculates how cyber security will evolve in 2015.
Author: ISBuzz Team
In order to encourage employees to use a secure file-sharing option, IT teams must implement a solution that’s even easier than a public cloud service.
In observance of Clean Out Your Computer Day on February 9th, TSG provides some suggestions for how users can declutter their computers.
Two security experts comment on the recent news that a new CTB Locker ransomware variant is targeting users’ data.
Jack Marsal of ForeScout Technologies discusses how network access control (NAC) can help companies better protect against breaches and other attacks.
Richard Moulds of Thales e-Security comments on an important partnership between Gem and Thales to bring HSM security to Bitcoin transactions and wallets.
Tom Neaves of Trustwave discusses how the increased awareness about cyber security at the board level is a step in the right direction.
Rick Delgado weighs in on what priorities IT security teams will focus on in 2015.
27001 Academy has created an infographic showing the state of data breaches in 2014.
According to Kaspersky Lab, the number of untrusted digital certificates used to sign malicious software doubled in the last year.