Data-centric security strategies are becoming the de rigueur thinking among thought leaders in information security.
Browsing: Data protection
Toby Scott-Jackson of SureCloud has listed the top vulnerabilities to look out for that could pose a serious barrier to PCI compliance for call centres.
Thales has launched a new report outlining how communications devices could operate securely over mobile phone networks.
Bob West of CipherCloud comments on the Moonpig vulnerability from the belief that companies have an ethical obligation to protect customer data.
An infographic instructs users about encryption and illustrates how they can protect their priceless personal information.
Pierluigi Stella, Chief Technology Officer at Network Box USA, provides his security predictions for 2015.
Kaspersky Lab’s security analysts have detected Chthonic, a significant new malware threat targeting online banking systems and their customers.
Trustwave researchers analyze ‘Spark,’ a variant of the Alina point-of-sale malware that has not been widely reported on.
The number of cloud apps that are still vulnerable to POODLE is dropping, but that doesn’t mean companies should assume they are safe.
Brian A. McHenry of F5 Networks discusses how the ratification of both HTTP 2.0 (HTTP/2) and TLS 1.3 will disrupt the Internet in 2015.