We recently posted: “A day in the life of a penetration tester (ethical hacker). What’s it like?” which covered the ‘fun’ and ‘boring’ bits of the job.
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
The Department of Homeland Security, via its ICS-CERT group, is reporting growing attacks against critical infrastructure with the energy sector leading the way.
Like bring your own device (BYOD) before it, the march of bring your own network (BYON) is happening silently, stealthily and almost completely outside of management control.
In order to better arm itself in the wake of rising threat of cyber crime, the government on Tuesday announced the National Cyber Security Policy 2013.
We are always spoilt in April with not only Infosec, but 44Cafe and BSides London too – and this year was another corker.
Updated Good Practice Guidelines, recently issued by the Business Continuity Institute, offers practitioners and companies alike a significantly improved set of methodologies that are easier to follow and implement.
Computer networks can be threatened by a host of potentially unexpected sources. Some of these start with ‘wardriving.’ Naturally, this begs a few questions…
You would have thought, maybe in light of recent events — I don’t know, perhaps a little thing called mass U.S. surveillance of foreign nationals — that the U.K. parliament, of all institutions, would be taking data protection and privacy a little more seriously.
There was a popular Aflac Insurance commercial series that ran several years ago featuring New York Yankee great Yogi Berra, known as much for his clever quips as his Hall of Fame baseball talents.
With all the stories currently making the rounds about NSA Hacking, the PRISM program, GCHQ setting up web cafes, Phine chargers that hack your phones and even Manchester City gettign hacked, you’d be forgiven for being a little sceptical as to why your comapny should move to the cloud.