Pinterest might come off to some as just another social network of digital boards teeming with frilly white dresses, gluten-free recipes, and tips for getting super-toned abs.
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals
Many in the industrial cybersecurity space have long pressed for faster action on the part of stakeholders. Over recent years, however, much of this emoting has seemed to fall on deaf ears.
Amid the tech giants and eager startups that have camped out in East London’s trendy Shoreditch neighborhood, the Open Data Institute is the rare nonprofit on the block that talks about feel-good sorts of things like “triple-bottom line” and “social and environmental value.”
Several years ago, Q1 Labs (now part of IBM Security) introduced the term “Security Intelligence” to describe the value organizations can gain from their security data by treating this information like they do the outputs produced from other business functions.
People are by far the biggest asset in your organisation, but continually companies fail to use their staff to combat cyber-attacks.
Google Glass, for all its promise, has some scary implications. Here is my list of 5 potential challenges we face with Glass:
PhishMe, the leading provider of security behaviour management services that improve employees’ resilience towards spear phishing, malware, and drive-by attacks, today announced the availability of its patent-pending Phish Reporter™
The tooth, which is designed to be worn much like an artificial denture, collects data on the movement of the mouth before transmitting it to a computer or smartphone.
Praetorian this week launched a free, cloud-based password auditing service that ferrets out weak passwords and hashes.