According to BBC reports, O2, one of the biggest UK mobile networks, appears to have suffered a data breach. The…
Browsing: CISO
Security experts from VASCO Data Security, STEALTHbits Technologies, Lastline and InfoArmor provide their insight on DNC email and email Encryption…
The Economist recently found the best way to ensure employees are “engaged” is to give them more control over where and how…
Search social media and delve into the dark web and you can find all sorts of useful data. James Parry,…
In response to recent developments of the Investigatory Powers Bill otherwise known as the ‘Snoopers Charter’, Richard Stiennon, Chief Strategy Officer…
ThreatConnect reassesses what could happen next in light of recent public statements by Guccifer 2.0. We described the current state of…
A hacker known as Guccifer has stolen files from the Democratic National Committee and has revealed the top Democratic Donors,…
Toby Scott-Jackson, senior security consultant at SureCloud explores how penetration testing has changed – and how it must continue changing…
Today’s digital threats are more numerous and sophisticated than ever. As a result, many in the security industry feel organizations…
While researching the dangerous banking trojan, Lurk, Kaspersky Lab security experts have found that criminals behind this malware used legitimate software…