Scott Goldman, authentication expert and CEO of TextPower, comments on common attacks against mobile apps.
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Professor John Walker gives his reasoning for why he sees Richard Clarke as one of the most influential people in the infosec field over the past decade.
Phishing emails are a persistent concern of information security professionals, and there’s no sign they’re going anywhere anytime soon.
To protect yourself from a data breach, here are a few ways to help you protect your customers and their data this year.
Once you give government emergency powers, it doesn’t like to give it back. That’s why, in recent years, I’ve spoken out against the likes of SOPA and PIPA.
Cloud computing has, in the past few years, become a viable alternative to in-house server-based solutions.
We can do better than that – this post highlights 5 key benefits of becoming ISO 27001 Certified. ISO 27001 Certification Return on Investment (and effort)
The most prevalent form of email data breach is delivering personally identifiable information to the wrong recipient.
Here is the full overview of the Heartbleed train wreck in the Secunia Infographic
Do you feel the US Patriot Act, and EU Data Legislations are in conflict leaving end users, and businesses confused as to their expectations of Privacy?