As businesses embrace BYOD, network engineers have to face up to the security implications of random, roving personal devices connecting to the corporate WLAN and accessing networked applications and data.
Browsing: Breaches
Michael Brophy, Certification Europe’s CEO, highlights why the human element is the weakest part of your information security system and sets out how to prevent data breaches.
With yesterday’s announcement by Apple of the new iPhone 5S, featuring Touch ID, their embedded fingerprint sensor, we are seeing an important change in the modern authentication landscape.
PRISM, XKeyscore, and plenty more classified information about the National Security Agency’s vast surveillance program has been dragged into the light since Edward Snowden began his leaks in May.
LONDON (UK) – September 11, 2013 – Varonis Systems Inc. , the leading provider of access, governance and retention solutions for human-generated data, today announced the launch of the Varonis Data Governance Suite 5.9,
New EU rules on personal data breach notification for telecoms and ISPs came into force recently (on 25 August 2013).
Today, everyone is talking about security. Just in the last sixty days there has been over 456,000 mentions of cyber attacks and data breaches in news, blogs, forums and Twitter.
If you are worried about the increased risk of hactivist attacks this week on 9/11, Tripwire can offer security tips for businesses from a few of their security experts
There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults.
As the United States and other world powers continue to debate a possible military intervention in Syria, the hacker collective Anonymous has gone ahead with its own intervention, taking on its Syrian counterpart — the Syrian Electronic Army.