Lancope, announces that its director of security research, Tom Cross, has been named a Ponemon Institute Distinguished Fellow.
Browsing: Data Protection
He says, “It is a primitive civilization that cannot follow even its own rules.” This is where we seem to be.
By correlating the data, Websense has demonstrated how any attacker intercepting this data can create a precise blueprint of the target’s hardware
A Brief History of Ciphers – This infographic from CipherCloud starts 1900 BC & covers a brief outline of the history behind Ciphers until 2010.
Encryption keys stored by the same CSP that stores your data are easier for government agencies to acquire.
Every year brings a fresh round of cyber security challenges & this year is sure to be no different.
Ely, England, 12 December 2013 – The coming year will bring a ‘storm of change’ in information security compliance,
Security experts at Tripwire have the following comments about Tuesday´s giant Microsoft patch
A few weeks ago, Dell proudly introduced our CONNECTED SECURITY vision and strategy to the world.
“A chain is only as strong as its weakest link”, it seems so cliché that most of us have no clue where this phrase originated or pay attention to the truth