The only question they had was ‘who had leaked this information from the plant’ a question I can attest was never satisfied.
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
The challenge for leaders is to create a BYOD strategy that allows employees to accomplish more work while protecting sensitive information from data theft.
Pen testing differs from other security measures in that it proactively seeks to emulate the enemy.
Willie Sutton responded when asked why he robbed banks, his simple and eloquent answer was ‘Because that’s where the money is’.
The technology, known as LatentGesture, was tested in a Georgia lab tech study using Android phones. Results were promising…
On March 27, a sandboxing technology provider published a white paper regarding 11 zero-day vulnerabilities they discovered in 2013.
As the infographic shows, the explosion in the popularity of Bring Your Own Device (BYOD) can be attributed to a number of things.
Protecting your Smartphone with a strong password or pattern is one of the simplest ways to strengthen the access security of your Smartphone.
Following news that an increasing number of Scottish police officers are being investigated for breaching data protection laws whilst on duty
There is an increasing amount of noise related to what it means when Microsoft stops releasing security patches for XP.