The energy sector will need to rely on IT security best practices to protect against cyber threats and keep the positive energy flowing.
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Colin Miles, CTO of Pirean, explores what innovations in planning and technology will likely shape IAM to better deliver business value in the years ahead.
BYOD requires a security policy which is enforceable, realistic, acceptable to users and doesn’t violate personal privacy laws.
Suzan Mustafa explains what two-factor authentication is, how it works, and how it can protect you against many nasty cyber-attacks.
James Brown of CompliancePoint emphasizes the importance of businesses retaining outsourced risk management expertise for increasing efficiency.
Acumin presents these suggestions for how you can strive to become a CISO.
Brian McHenry discusses the pitfalls and effectiveness of encryption methods used for internet traffic.
Professor John Walker proposes that we should utilize the element of imagination to think as would a cyber criminal to locate security unknowns.
Claus C. Houmann interviews one of the founders of Malware Must Die and discusses information security, hackers, and malware.
McAfee presents the 25th Anniversary of the Firewall Infographic that creatively depicts the ‘lifetime’ of the firewall.