One such example is to take a straw poll to understand the number of IP connected devices those in the audience have at home, for the record the most anyone has ever answered is 71 (you know who you are!).
Browsing: Articles
Information Security Buzz articles cover the latest cybersecurity topics, featuring thought leadership from industry leaders and experts.
Who will get swept away and who will discover new lands? Here’s what’s happening in IAM these days and why federating the identity layer
The landscape is no longer just about “keeping the bad guys out”, but more about “catching the bad guys quickly when they’re in”, and learning from it.
Organizations will see more and more business benefits of information security which will, of course, make information security projects easier.
Security professionals are the paranoid type anyway and I’m pretty sure they questioned this before, but now their paranoia can be justified.
In response to the news that Yahoo has announced plans to encrypt all internal traffic following the National Security Agency disclosures by Edward Snowden
Proper session management is an ongoing challenge for mobile application developers. It’s not uncommon for mobile apps to have multiple session management errors, putting the application at risk.
Information Security, over the next two years will be shaped by a natural progression from Big Data to Deep Data and an ever-increasing focus by governments on Cyber Security.
For security to be successful, it must be integrated. To be integrated, the value it offers must resonate on an individual basis while aligned with the needs of the organization.
After 9-11, privacy got shafted in the rush to build tougher security, but we’ve seen how that has led to governments abusing authority.