Latest Hacker Intelligence Initiative Report Finds Cyber Criminals Adopting Database as a Service for Infection and Data Exfiltration
Browsing: CISO
A few weeks ago, Dell proudly introduced our CONNECTED SECURITY vision and strategy to the world.
With over 19,500 certificates issued worldwide, and a year-on-year growth, ISO 27001 is the most widely adopted information security best practice framework
Methods for Preserving Data Integrity include, Document Protection, Create an Auditable Chain of Custody and Generate Checksums
As if 2013 was not exciting enough in the world of cyber security, 2014 will continue to keep us on our toes.
‘What 2 things are most likely to change the security industry in the next 2 years? And why?’
For security to be successful, it must be integrated. To be integrated, the value it offers must resonate on an individual basis while aligned with the needs of the organization.
In response to the news that the International Atomic Energy Agency (IAEA) systems have been infected with an unknown data-stealing malware, Tim Erlin, director of IT risk and security strategy, at Tripwire has made the following comments:
Following the news that London banks are to participate in cyber attack ‘war game’ Waking Shark II on 12 November, Barry Shteiman, senior security strategist at Imperva, has commented:
This discussion will highlight the importance of establishing organizational identity which is a key component for shared local, regional, national and international situational awareness.