There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults.
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
As more and more information about the NSA’s global surveillance capabilities emerges through leaks of material obtained by Edward Snowden
According to Verizon’s 2013 State of the Enterprise Cloud report, the enterprise use of cloud technology grew by 90 percent between Jan 2012 and June 2013.
Though many enterprises invest in security testing ranging from automated vulnerability scans to full-out penetration testing, in rare instances do organizations do root cause analysis
In connection with my privacy and data security training business, TeachPrivacy, I was recently asked whether I had a list of the various laws, regulations, and industry codes that require privacy and/or data security training.
On the Cryptography mailing list, John Gilmore (co-founder of pioneering ISP The Little Garden and the Electronic Frontier Foundation; early Sun employee; cypherpunk; significant contributor to GNU/Linux and its crypto suite
While malware developers keep working on improving their creations by leveraging non-HTTP channels, such as peer-to-peer, most malicious programs still use HTTP.
Over the last few months, you undoubtedly have heard a lot of crazy sounding stuff in the news, from National Security Agency (NSA) leaks from Snowden, cryptography, hackers, threats, vulnerabilities, and more.
Financial companies in South Korea will increase their identification process for online users in a bid to prevent further cyber fraud.
The latest gadgets, such as Google Glass, and a number of others, are gaining a great deal of hype, but as much as they have a great deal of potential, they may also be placing privacy and mobile security at risk.