It has been reported that hackers likely based in the Middle East have launched a new Gmail phishing campaign that’s trying to…
Browsing: Data Protection
Google announced a new beta capability on its Cloud Platform Blog: support for customer-supplied encryption keys – “Bring Your Own…
Lock & Key is a component of Imation’s recently announced Secure Data Movement Architecture (SDMA™), integrating administrative security with Imation’s…
Few would deny that the number of cyber-attacks – whether made public or not – is growing. Today, there are…
In response to consumers’ demand for instant, always-on service, UK financial firms are showing a growing interest in cloud services.…
HP has released a new study on smartwatch security. Ten smartwatches tested by HP Fortify contained significant vulnerabilities, including insufficient…
Is it safe to use webmail on work computers? Security Experts from Proficio and STEALTHbits commented on the DHS Using Webmail…
Following a demonstration of an attack from Mathy Vanhoef and Frank Piessens of the University of Leuven, that showed a…
Recently, a new set of OpenSSL vulnerabilities was announced and a new set of patches were released. Naturally, visions of…
What would happen if access management disappeared overnight and we had to cope the next day without it? What impact…