According to a new report from Intermedia, employees often leave their jobs with their corporate IT access intact.
Browsing: Data Protection
BYOD requires a security policy which is enforceable, realistic, acceptable to users and doesn’t violate personal privacy laws.
Brian McHenry discusses the pitfalls and effectiveness of encryption methods used for internet traffic.
Mobile malware is increasingly the preferred method of attack for fraudsters, which raises the likelihood of a major mobile banking attack in the U.S.
Recently security vendor McAfee released a piece of research which revealed that cybercrime costs the global economy £266 billion each year.
A group of security experts in the information security industry comment on the recent CyberVor attack.
A recent survey found that businesses with fewer than 100 employees are significantly less likely to prioritise their IT strategy than larger businesses.
In June of 2014, a group of hackers accessed and downloaded the personal information of over 600,000 French and Belgian Dominos customers.
FireLayers weighs in on how to address the CAC market.
In the wake of the Snowden affair, it is important to keep our facts straight – about cyber war, China, and relevant literature on cyber security.