
How to Build a Successful Incident Response Plan
The fight to protect your company’s data isn’t for the faint of heart. As an embattled IT warrior, with more systems, apps, and users to
The fight to protect your company’s data isn’t for the faint of heart. As an embattled IT warrior, with more systems, apps, and users to
Recently, Chinese iOS developers have discovered a new OS X and iOS malware that has appeared in malicious versions of Xcode, Apple’s official toolkit for
Advanced Persistent Threat (APT) type attacks continue to emerge on a global scale. What makes these attacks deviate from the norm is often the resources
In both April and June this year, a series of cyber attacks was conducted against the United States Office of Personnel Management (OPM). These attacks
“We couldn’t possibly use the cloud. It’s not secure.” For the past few years, this has been the refrain of many businesses. Despite the rapid
Microsoft has suffered significant PR consequences for its consumer-unfriendly privacy practices. The company received major criticism when a federal criminal complaint revealed that Microsoft inspected
SQL Injection (SQLi) attacks have been around for over a decade. You might wonder why they are still so prevalent. The main reason is that
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics