In this article I am referring to this as OSINT, and an established process of a Security Triage to discover what you don’t know
Browsing: Breaches
While the IT industry is aware of the end of XP, the retail and hospitality industries including restaurants don’t know their systems will be compromised
Cryptzone, a leading provider of encryption solutions and identity and access management (IAM), has been acquired by Medina Capital
Tripwire have announced detection for Heartbleed (CVE–2014-0160), the OpenSSL vulnerability announced on April 8, 2014
The April 7, 2014 NY Times article, “Hackers Lurking in Vents and Soda Machines,” surely raised the hackles of enterprise security teams worldwide.
Salesforce.com, Gmail, and Google Docs are examples; your data isn’t on your computer—it’s out in the “cloud”, and you access it from your web browser.
The only question they had was ‘who had leaked this information from the plant’ a question I can attest was never satisfied.
The challenge for leaders is to create a BYOD strategy that allows employees to accomplish more work while protecting sensitive information from data theft.
Pen testing differs from other security measures in that it proactively seeks to emulate the enemy.
54 percent of companies in the UK are using incorrect metrics when trying to determine their IT security status