What to secure first There is a seemingly constant influx of news regarding cloud adoption trends, but what seems to…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Public relations and advertising specialists for many years have clung to the myth that there is no such thing as…
The decision to move to the cloud may seem an obvious one. It’s faster, more scalable, and more agile. However,…
Wi-Fi has enabled the mass adoption, use and innovation of connected devices. We have come to expect ubiquitous Wi-Fi wherever…
Much of the excitement surrounding the WikiLeaks “Vault 7” release of purported CIA documents concludes that the CIA has broken encryption. We…
Malicious email attacks have dominated the security headlines in recent months, with 2017 already seeing large campaigns targeting Netflix and…
At the end of last century, political scientist Francis Fukuyama, surveying the latter events of the 20th century—the fall of…
Many organizations are increasingly outsourcing software development and acquiring open source software products. In an effort to reduce costs for…
Financial institutions have until Oct. 2017 to comply with many of the New York State Department of Financial Services (DFS)…
New research finds worrisome security issues for anyone who uses the Uber app. Late last year, Uber launched a major…