Taking the software updating process away from the IT administrator will not only ensure that potential exploits are patched, but can also save time.
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
By 2020, securing enterprise IT will require a shift to information and people-centric security strategies focused on an infrastructure’s end-points.
These are the words that make sales reps both happy and sad when testing the market for customers of Data Loss Prevention (DLP) solutions.
The concept of “IT Service Management” or ITSM may be a designation headed for extinction.
Healthcare organizations must embrace HIPAA as an on-going, full-time effort that requires a program of resources and compliance tools to ensure success.
Malware called Gameover, Zeus, GOZeus, or P2PZeus has been created by Cyber Criminals and is in active circulation as of June 2014
Based on your experience and knowledge, what would you say is the BEST Information Security event to attend and why?
Nowhere is this seen more clearly than in the case of Article 17, the ‘right to be forgotten and to erasure’.
Here are some security tips that every mobile application developers should note.
You can see the manual analysis I did on a fresh sample unrelated to Gameover that arrived in my home email on June 1st.