Our estimate suggests that criminals could penetrate three quarters of the U.S. corporate world using unpatched Windows XP vulnerabilities.
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward.
Most of all though, we need to tread carefully when deciding which tasks to hand over to the IoT – once we have given up control it may be hard to regain it
It’s a common dilemma many cyber security professionals face when weighing the possibility of earning a new certification
From my 2+ decades of professional experience I’ve seen the following two information security practices to be the most important for adding security value
Hardware and software are like love and marriage and, to reference the old Sinatra classic, you can’t have one without the other.
In my opinion, there is but one control that is key to all the others: Competence. Competence comes in a number of ways, including…
So, how do the seven deadly sins manifest themselves in IT security? More easily than you might think. Let’s take a look.
Today’s NAC solutions are capable of providing appropriate access to network resources based on the identity of the device, functionality and state.
Encryption should be used across the enterprise, especially for host devices such as desktops, mobile devices and laptops.