IT security has moved to top-of-mind status for board and executive teams; that’s no surprise. As a top business priority,…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
The prime position of the Chief Information Security Officer (CISO) has been debated for years within the corporate hierarchy. It’s…
As somebody who works closely with cryptocurrencies, it’s very common for me to receive phishing emails. Of course, we have…
Consumer trust in a business has never been so critical. Take, for example, the recent hack on Ashley Madison which…
Federating Access through SAML or OpenID Connect is Not Enough—Go the Last Mile with a Federated Identity (Data) Service With…
A fierce storm blows through your town in the wee hours of the morning. Upon waking up a few hours later, you…
Almost every website and app relies on a username and password combination to authenticate users. And that system, which the…
Encryption is a Red Herring – Segmentation is the key to Effective Security A new month, a new data breach.…
The decision to move to SIP trunking appears straightforward: reduced costs, greater scalability, improved disaster recovery options and access to…
The volume and severity of threats is increasing every year, which means that it’s more important than ever to detect…