One wireless security risk that’s easy to overlook is the threat from unlicenced transmissions. Unlike wired networks, wireless LANs don’t have singular points through which all traffic flows.
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
As if 2013 was not exciting enough in the world of cyber security, 2014 will continue to keep us on our toes.
Although federation divides the work between an identity provider (IdP) and a service provider/relying party (SP/RP)
In response to the news that another Bitcoin company has been hacked and $1 million was stolen, Amichai Shulman, CTO of Imperva has the following comments:
According to a post on the Russian cybercrime forum, i2Ninja offers a similar set of capabilities to the ones offered by other major financial malware:
‘What 2 things are most likely to change the security industry in the next 2 years? And why?’ Kai Roer, The Roer Group, Senior Partner
Cloud and BYOD are all converging on security professionals like ants to a picnic. So many of the traditional tools and methodologies the security industry
The security industry is a bit like an episode of Star Trek in that it’s pretty formulaic. A bad guy appears and cuts through the defenses,
‘What 2 things are most likely to change the security industry in the next 2 years? And why?’
We will need folks who can recognize new information security and privacy risks, there is no textbook to look to as risks evolve.