Professor John Walker proposes that we should utilize the element of imagination to think as would a cyber criminal to locate security unknowns.
Browsing: CISO
Bob’s Business notes how most mobile devices today are insecure and suggests what you can do to protect you and your business’ mobile information.
A recent survey found that businesses with fewer than 100 employees are significantly less likely to prioritise their IT strategy than larger businesses.
Over the past five years, the threat of hacktivism, as embodied in different #ops, has grown exponentially in the Middle East.
McAfee presents the 25th Anniversary of the Firewall Infographic that creatively depicts the ‘lifetime’ of the firewall.
Collective Compliance Management provides a real opportunity to get to grips with the business and gain insight into how the organisation functions.
Security expert notes that the foundation of any endpoint security program is visibility.
Aorato releases new research report that finds weak encryption enables attacker to change victim’s password without being detected.
Cryptzone, a pioneering provider of encryption solutions and identity and access management, has confirmed it has secured the appointment of Andy Knapp.
Introducing the 10 commandments of your digital life according to Neira Jones.