As the desire for business agility increases, companies are bypassing security teams and processes to set up risky IT infrastructures in the cloud
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
Recently I was reminded of this well used, wedding related phrase when my daughter announced her intention to marry. A joyous occasion for all, except, of course, the father of the bride (yes we’ve all seen that film!).
In an attempt to tackle cyber-security, two-thirds (70%) of IT professionals believe that hiring ex-hackers could be the solution, if they have the right skills needed to do the job.
Most systems are insecure, not because we don’t know about or understand the vulnerability but because we fail at planning and communicating the solution to address or mitigate the vulnerability.
Science fiction writers have long told of great upheaval as machines replace people. Now, so is research firm Gartner. The difference is that Gartner
Wondering if that mobile app is safe? There’s a score for that. If that business partner takes security seriously? There’s a score for that too.
Michael Rosenbaum, founder and CEO of Catalyst IT Services, thinks software development could be quantified in a way akin to the moneyball tactics in baseball.
Cyber-spies are targeting Mongolian businesses and government agencies to keep the attackers “aware” of the land-locked country’s relationships with “Western influences” like the US and the European Union, according to a recent report.
Once again, Facebook is doing away with a feature that many users didn’t even know they could use, but a small, privacy-conscious minority is glad to have (had).
The popular mobile messaging application WhatsApp Messenger has a major design flaw in its cryptographic implementation that could allow attackers to decrypt intercepted messages, according to a Dutch developer.