Fans buying tickets for Adele’s tour have told the BBC they were shown the address and credit card details of…
Browsing: Breaches
The ubiquitous authentication methodology Two-factor authentication (2FA) has been about for much longer than you think. For a decade or…
Security experts from Lastline and Balabit have the following comments on SQL Injections. [su_note note_color=”#ffffcc” text_color=”#00000″]Péter Gyöngyösi, Product Manager of…
Tod Beardsley, Security Engineering Manager, Rapid7 have the following comments on OpenSSL Vulnerability. [su_note note_color=”#ffffcc” text_color=”#00000″]Tod Beardsley, Security Engineering Manager, at Rapid7…
JC Gaillard of Corix Partners shares his top 4 tips for CIOs to effectively and efficiently deal with the matter…
Nearly 5 million customers including those in the US, UK, France and China were affected in a data theft that…
For month of November, question to our expert panel members is: Which research topic or project in cyber security do…
Cyber attackers have an abundance of opportunities to steal or modify data and disrupt business services. And their playground grows…
Clearswift launches the 2015 Clearswift Insider Threat Index (CITI), an international annual study exploring the changing nature of the insider…
If you haven’t read “The Martian” or seen the movie, stop right now and go read it. It’s a great…