There are many reasons businesses need to protect themselves from a possible data breach via third-party data recovery providers.
Browsing: Breaches
Sarah Clarke digs deep into the many risks associated with our use of the cloud.
The use of advanced, secure file-sharing solutions offers a great way to assure data security for BYOD users and their employers.
Philip Lieberman of Lieberman Software reveals the myth that “detect and respond” technologies are “silver bullet” security solutions.
HP has unveiled the results from a new study on the importance of senior executive involvement in a breach response plan.
Vox Mobile has prepared a list of tips that can help you develop an effective BYOD strategy.
A number of information security experts comment on ongoing investigations into a possible data breach at Staples.
According to Kaspersky Lab, spammers in September produced topical new versions of the old “Nigerian Letter” scam, spam this time based on the Ebola virus.
Corporate boards need to get off the dime and fund their IT security departments with the tools to stop “identity,” i.e. root-based, attacks.
Veracode has released analytics from its cloud-based platform revealing the vulnerabilities created by the use of open source and third-party components.