Corero Network Security provides a few tips for how organisations can brace themselves to effectively identify and mitigate the risk of DDoS attacks.
Browsing: CISO
Wisegate Editor-in-Chief Elden Nelson reveals the top takeaways from a BYOD roundtable on best practices for a BYOD policy.
Ryan Fox of ID.me discusses the need for strong authentication with respect to President Obama’s Executive Order back in October on identity theft.
Rick Delgado discusses the need for companies to come up with BYOD strategies that emphasize security and information protection.
The ongoing string of data breaches illustrates that enterprises must make a much more concerted effort to improve security.
Although organisations have made strides in establishing best practices for the IT audit function, many are struggling to keep pace with global IT risks
The Wisegate Knowledge System Grows with Curated, Topical Collections of IT’s Best Tips and Resources from Wisegate and Around the Web
McAfee, now part of Intel Security, issued a new report, When Minutes Count, that assesses organisations’ abilities to detect and deflect targeted attacks.
Arxans’s State of Mobile App Security report reveals that 97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked.
A number of information security experts comment on the news that the United States Postal Service was recently breached.