In the past, the main drivers for data archiving centred on legal and compliance initiatives and business continuity, including eDiscovery,…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Damballa discovers new toolset linked to Destover Attacker’s arsenal helps them to broaden attack surface Destover is best known as the…
The ubiquitous authentication methodology Two-factor authentication (2FA) has been about for much longer than you think. For a decade or…
Advanced Persistent Threats as we know them will cease to exist in 2016, replaced by deeper, embedded attacks that are…
JC Gaillard of Corix Partners shares his top 4 tips for CIOs to effectively and efficiently deal with the matter…
Research from Kaspersky Lab unveils a nation of phone snoops, as Brits clamp down on their partners’ secrets With the…
Brand new, child-friendly ESET Parental Control for Android app is now available worldwide ESET®, a global pioneer in IT security…
With everything from televisions to smart meters now connecting to the expanding Internet of Things, Mike King, Supervisor at WhiteHat Security’s…
Data security ‘was & is & will be’ always pivot for any organization dealing with data. Now the question is…
Kaspersky Lab’s latest report – ‘Spam and Phishing in Q3 2015’ reveals the latest spam and phishing trends across the globe.…