Professor John Walker gives his reasoning for why he sees Richard Clarke as one of the most influential people in the infosec field over the past decade.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
Sestus has advised users to treat business centre PCs and networks as hostile and to be vigilant.
Though packet capture is great, it does have some limitations that need to be recognized for forensics.
Emulex study shows that 45% of IT staffs monitor network and application performance manually, instead of implementing proven network monitoring tools.
BYOD can be complicated, but with a few helpful tips, enterprises can implement and maintain an effective BYOD initiative.
In the case of cybersecurity, we are better protected when we work together, that is, when we share intelligence about the latest cyber threats.
BrightTalk Presents its Network Security Summit next month, which will cover topics including pragmatic network security and much more.
ForeScout Technologies, Inc. has announced the publication of its 2014 Cyber Defense Maturity Report.
Security expert notes that the foundation of any endpoint security program is visibility.
Aorato releases new research report that finds weak encryption enables attacker to change victim’s password without being detected.