A report by WhiteHat Security reveals that programming language choice has little effect on website security.
Browsing: Breaches
On reading the subsequent news stories, no doubt many people wondered how anyone could have been so careless.
In this article I am referring to this as OSINT, and an established process of a Security Triage to discover what you don’t know
While the IT industry is aware of the end of XP, the retail and hospitality industries including restaurants don’t know their systems will be compromised
Cryptzone, a leading provider of encryption solutions and identity and access management (IAM), has been acquired by Medina Capital
Tripwire have announced detection for Heartbleed (CVE–2014-0160), the OpenSSL vulnerability announced on April 8, 2014
The April 7, 2014 NY Times article, “Hackers Lurking in Vents and Soda Machines,” surely raised the hackles of enterprise security teams worldwide.
Salesforce.com, Gmail, and Google Docs are examples; your data isn’t on your computer—it’s out in the “cloud”, and you access it from your web browser.
The only question they had was ‘who had leaked this information from the plant’ a question I can attest was never satisfied.
The challenge for leaders is to create a BYOD strategy that allows employees to accomplish more work while protecting sensitive information from data theft.