In what is likely to be a short-lived cessation in Dridex campaigns while the criminal proponents behind that malware scramble…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Businesses today thrive on connectivity. However, easily/remotely accessible networks come with numerous well-documented security risks, particularly from malicious cyber attacks.…
Network behavioural analysis – a systematic, architectural approach to network security – involves deep packet analysis to identify advanced persistent…
Seeing the fact that Amazon is the World’s largest retailer it’s surprising that there aren’t more of these scams, but…
The recent news about the Canadian election candidate not knowing about Auschwitz, apart from her apparent ignorance, highlighted an issue…
Apple Pay created plenty of buzz when it launched last year. Since then Google and Samsung have followed suit with…
I have been asked by several friends who are CISOs within different organizations if Capture the Flag (CTF) experience makes…
Technology vendors like to discuss the business value of our solutions, but we are often less keen to discuss deployment…
Simplicity is key to a secured enterprise Security is a unique IT discipline. It overlays and supports all other disciplines:…
Software presents a particularly vexing problem for most organisations. On one hand, enterprise applications are mission-critical, running every facet of…