Companies must start employing a proactive, as opposed to reactive, approach when it comes to preparing for targeted cyber attacks.
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
Users’ access rights, specifically instances of insider misuse, have become a weak point in security policies for a majority of organisations.
Introducing 2FA as a simple username and password combination is no longer enough to guarantee an adequate level of security.
Databarracks has revealed a significant disparity between organisations’ attitudes and approaches to business continuity (BC) and disaster recovery (DR).
People solve problems all the time, but when it comes to risk management, relying on a person is no substitute for a process.
Yonni Shelmerdine of Lacoon identifies a number of critical takeaways with respect to the iCloud hack.
What would happen if the very Android devices managed by the MDM were to be successfully compromised? Could this mean the end of BYOD?
Magnetic tape was first used to store computer data in 1951. By the mid 1970s pretty much everyone relied on tape cassettes and cartridges.
Given the risks of suffering a breach, it is important that businesses work to develop a culture that gives priority to keeping their information secure.
With the latest retail breach at Home Depot, attention has again turned to credit card black markets