In less than 300 seconds you can experience the speed and intensity of a cyber attack. Today companies can defend themselves, taking control of the situation – effectively fighting back. Are you prepared?
Browsing: News & Analysis
At Information Security Buzz, we deliver the latest cybersecurity news, featuring expert insights, industry updates, and in-depth analysis.
More than two-thirds of online retailers say that proposed changes to EU data protection rules will damage business, according to a poll by Europe’s largest e-commerce association.
The US has said that it only gathers as much foreign intelligence as every other country, after a German newspaper accused the country’s National Security Agency of bugging EU offices.
A persistent, widespread malware campaign that utilizes compromised Apache servers is locking users’ computers and demanding a fee of US$300 to free their data.
The ICT4Peace Foundation, in collaboration with the Berkman Center for Internet and Society at Harvard University and GeorgiaTech, is pleased…
While many defenders spend much of their time analyzing tools and tactics of their adversaries, getting into the head of potential intruders and determining how they’re motivated can tip defenders off to an attack as surely as a tell will tip off the good hand of a gambler.
This time last year, after Computer Weekly announced the first of our now-annual list of the 25 most influential women in IT, I wrote in this blog about why we don’t want to have to write about the issue of women in IT anymore.
You’ve probably seen them making the rounds on social media: the brain-busting, stutter-inducing questions asked in job interviews at places like Google (How many cows in Canada?)
Jay-Z’s ‘Magna Carta Holy Grail’ app was cloned by computer hackers to display anti-government messages.
To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive, and real-time