Vox Mobile has prepared a list of tips that can help you develop an effective BYOD strategy.
Browsing: CISO
A number of information security experts comment on ongoing investigations into a possible data breach at Staples.
Charles Sweeney reflects on some companies’ hesitance to move to the cloud.
According to Kaspersky Lab, spammers in September produced topical new versions of the old “Nigerian Letter” scam, spam this time based on the Ebola virus.
Corporate boards need to get off the dime and fund their IT security departments with the tools to stop “identity,” i.e. root-based, attacks.
Veracode has released analytics from its cloud-based platform revealing the vulnerabilities created by the use of open source and third-party components.
Identity theft is a serious concern against which all online users need some kind of protection.
Allan Pratt weighs in on the benefits and risks associated with using cloud applications.
While there has been much talk about how Apple Pay might disrupt the payment system, and how easy it will be to use, its security is being overlooked.
McAfee has launched a new report predicting how the next generation of government might look and what the future security challenges might be.