“There are only two kinds of companies. Those that were hacked and those that don’t yet know they were hacked.”…
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Do you think that your favourite website spying on you? Every time we browse the web we leave behind a…
In Software Defined Network (SDN) architecture, the control plane is separated from the data plane and implemented in a software…
As we kick off 2015, I predict that this will go down in history as the year of the Threat…
Many companies feel overwhelmed with the burden of covering all aspects of IT security, since growing network structures and factors…
There’s no question that the Box IPO has validated the market demand for simple ways to share and collaborate on…
Many of the most popular games out today are those that include, and heavily rely on, a multiplayer aspect.
According to the BBC PC maker Lenovo has been forced to remove hidden adware that it was shipping on its…
You can’t secure what you don’t know. This is a fundamental security concept. Yet, in today’s world where nearly every…
As reported by a number of different sources, Google’s primary web property in Vietnam (www.google.com.vn) had its DNS abused by…