Banks could block customers from claiming money back if they are a victim of fraud and it is found they…
Browsing: CISO
Running behind trendy APTs we tend to forget about common-sense approach and holistic risk assessment. Almost 3 terabytes of data stolen…
With the news of the Pavlok wristband which conditions wearers into good behaviour by using shock therapy, Liviu Itoafa, security researcher at…
Merging worlds The merging of the organic and digital worlds is undoubtedly gathering pace. As humans, we ourselves are now…
The reports of further LinkedIn user’s passwords being sold online, following a hack four years ago, demonstrates the need for…
Recently, the Defending Law Firms from Cyber Attack Conference saw experts from the fields of government, law and cybersecurity present their views…
A new list of the biggest business disasters of the last 12 months contains plenty of the unexpected, as well…
Industry leader evaluates confidence in seven key security controls required to detect cyber attacks on endpoints Tripwire, Inc., a leading…
Following the discovery of a critical zero-day vulnerability in Adobe’s Flash Player which is being actively exploited in real-world attacks to infect…
Following a security breach like the recent ‘Kiddicare.com’ hack, the security impact of such exposure isn’t limited to an individual’s…