Unlike computers, media players and smart products are comparatively easier to penetrate, less secure from a design or consumer standpoint
Browsing: Breaches
2014 provides us with the opportunity to practice safe hex (thank you @BrianHonan for that!)
Following the news that Target announced regarding it´s recent data breach affecting 110 million customers, here are some thoughts from security experts
Where there’s a breach, there’s a phish: If you hear of a data breach at a company of which you are a customer, either now or even in the distant past,
Security policy and awareness are often lumped together and usually perceived as Awareness training on company policies.
Clearly, cyber security has become a serious concern in some government circles. Yet it has failed to do so in the minds of policymakers.
Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, and CORE Security
While IAM solutions are increasing their capabilities to manage cloud accounts, cloud providers are also creating APIs to allow for direct access management.
So what does 2014 hold for the Internet of Things and information security? We’ll likely see the FTC, led by their Chairwoman, Edith Ramirez,
By correlating the data, Websense has demonstrated how any attacker intercepting this data can create a precise blueprint of the target’s hardware