Mobile shopping adds even more convenience to online shopping as it can be done while on the go. However there are a number of security concerns which are often overlooked by consumers.
Browsing: Breaches
In a new blog post, researchers from Imperva’s Application Defence Centre (ADC) team, take a close look at the recent data breach against Loyaltybuild.
WASHINGTON—Cyber security experts stated on Tuesday that HealthCare.gov should be temporarily shut down in anticipation of ongoing cyber security concerns.
Tripwire, Inc., announced the results of research on risk-based security management in the healthcare and pharmaceutical industries.
One such example is to take a straw poll to understand the number of IP connected devices those in the audience have at home, for the record the most anyone has ever answered is 71 (you know who you are!).
The landscape is no longer just about “keeping the bad guys out”, but more about “catching the bad guys quickly when they’re in”, and learning from it.
Security professionals are the paranoid type anyway and I’m pretty sure they questioned this before, but now their paranoia can be justified.
Shadow IT, the latest phrase for the informal layer of IT built and used inside your organisation that you have almost no control over.
In my mind, Dark Data is a subset of Big Data—enormous but without formal boundaries as defined by database schemas.
A recent survey suggests that over half of IT professionals* now recognise the dangers of targeted attacks, but despite this awareness those surveyed are worryingly uncertain of their ability to deal with them.