During the month of July 2018, I had the absolute pleasure to both attend and present at one of the…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Summary In an earlier article we briefly referred to Expanded Password System (EPS) that accepts both images and texts as…
There is no such thing as ‘designing an artificial intelligence (AI) strategy’ because AI should be part of the business…
One year on from the global outbreaks of WannaCry and NotPetya, which established ransomware as one of the most notorious…
Enterprise Mobility Management (EMM) is the process of leveraging people and technology to secure sensitive data present on employee devices.…
Wouldn’t it be great if IT teams and network managers could simply outline, at a high level, what they want…
An expert in IoT security offers perspective on findings by (published on Twitter) by Ankit Anubhav, Principal Researcher at NewSky Security,…
Today, even beginners and technical laymen can easily launch a DoS attack, using one of the many free attack tools…
Insider threats can pose a serious risk to security. Yet out of approximately 250 professionals surveyed by Varonis1, as many…
How automation and orchestration optimise operations Programmability is critical in modern data centres and the cloud to support automation, orchestration,…