Professor John Walker proposes that we should utilize the element of imagination to think as would a cyber criminal to locate security unknowns.
Browsing: Breaches
The fundamental business challenge is how to ensure that IT contractors become productive quickly without increasing risk.
A recent survey found that businesses with fewer than 100 employees are significantly less likely to prioritise their IT strategy than larger businesses.
In June of 2014, a group of hackers accessed and downloaded the personal information of over 600,000 French and Belgian Dominos customers.
Change and configuration auditing is essential for organisations that need PCI DSS, says Netwrix.
FireLayers weighs in on how to address the CAC market.
In the wake of the Snowden affair, it is important to keep our facts straight – about cyber war, China, and relevant literature on cyber security.
McAfee presents the 25th Anniversary of the Firewall Infographic that creatively depicts the ‘lifetime’ of the firewall.
Web application firewall (WAF) services will now be natively integrated in the KEMP Technologies LoadMaster Operating System (LMOS) for load balancers.
With all security and privacy concerns addressed through PCI DSS, SMS has become an extremely convenient platform for notification and authentication.