“We do not see the computer virus as something we should take seriously” – The CESG signal commented that the computer virus was only a passing nuisance!
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Will the Blackphone end up being “NSA-proof,” as some supporters have suggested? Probably not.
Revealing sensitive company data is a high-risk strategy. The employee concerned risks derision, dismissal or even a prison sentence
I discussed this direct mail piece with Rebecca Herold (@PrivacyProf ), internationally-known privacy expert and fellow privacy advocate, and she agreed
It’s been reported that at least a couple of thousand Tesco customers have had their online details breached.
Infographic designed by Moka5, outlines 3 barriers and 3 drivers for implementing a BYOD policy and the one solution that can satisfy both end-users and IT
Large numbers of organisations are still dissuaded from investing due to the perceived cost and complexity of the technology
This comes back to the premise of if you are doing information security and data protection for real, or for show and bling.
When it comes to Cyber Security, during Waking Shark II, there were what seem to be issues with a lack of investment
In many instances, the most damaging data breaches an organization will face are from an internal source, be it an employee, contractor or temp worker