When the first revelations of former contractor Edward Snowden came out, it was a watershed moment for the debate on…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Information security compliance requirements are often criticized for their check-box approach to security, and the Payment Card Industry Data Security…
The subject of mobile payments has been hitting the headlines recently, with the launch from Google of Android Pay at…
As the BYOD concept continues to ebb and flow, many companies spend a lot of time weighing out the benefits…
When people think about securing their network, the term “identity and access governance” (IAG) might not come to mind. Most…
Q2 Enhances Layered Fraud Protection with Easy Solutions; Companies Expand Partnership Easy Solutions, the Total Fraud Protection company and Q2…
These days, cyber crime is a lucrative business, and cyber criminals take their time to investigate their potential target before…
Overworked system administrators and their equally harried managers everywhere would love to hear from vendors that some SILVER BULLET security technology…
Nation-state sponsored Cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex, modular tools, and keeping well under the…
Here to comments on the news of German Drug Bust is the security expert Ken Westin, senior security analyst for Tripwire.