Trustwave researchers analyze ‘Spark,’ a variant of the Alina point-of-sale malware that has not been widely reported on.
Browsing: Data Protection
The number of cloud apps that are still vulnerable to POODLE is dropping, but that doesn’t mean companies should assume they are safe.
Brian A. McHenry of F5 Networks discusses how the ratification of both HTTP 2.0 (HTTP/2) and TLS 1.3 will disrupt the Internet in 2015.
Michael Aminzade of Trustwave reflects on what organisations can do to help protect themselves from falling victim to a breach.
Easy Solutions Product Manager Damien Hugoo discusses the promise of tokenization for payment security in 2015.
Intel® Security has released its McAfee Labs’ November 2014 Threats Report, including an analysis of threat activity in the third quarter of 2014.
Egress Software Technologies has designed an infographic illustrating the extensive history of encryption.
Trustwave’s 2014 State of Risk Report reveals that certain security deficiencies are increasing the risk of a data breach for companies, among other things.
Wisegate Editor-in-Chief Elden Nelson reveals the top takeaways from a BYOD roundtable on best practices for a BYOD policy.
Claus Cramon Houmann recalls his experiences at the Hack.lu infosec conference this year.