A leading Internet security provider recently released a report revealing how attackers exploit end-users’ human flaws
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Like a lot of our fellow information security professionals, we’re once again attending the RSA Conference, being held this week in San Francisco.
Security is a tradeoff, a balancing act between attacker and defender. Unfortunately, that balance is never static.
However, BYOD as a practice does come with its share of pitfalls, the biggest being confidentiality and security of company data.
The Bring Your Own Device (or BYOD) policy allows employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace
Passwords, passwords, passwords! There’s no escape! You need them to bank online. You need them to log in to the many social networks you use.
Target announced that 110 million customer cards had fallen into the hands of hackers. That means that 1 in 3 Americans was affected by this cyber attack.
Randstad recently released their top IT Jobs list for 2014 which included Big Data, Mobile and Web positions based upon demand and compensation research.
Is Cloud The Saviour or The Grim Reaper? Ultimately it will depend on how the CIO responds. But without a doubt, ignore Cloud at your peril…
Our community is only talking internally and that´s where things are falling apart between our knowledge and the transfer of that knowledge to other parties