In 2014, Zscaler sees these two major trends – the evolution of advanced threats and the complexity of cloud and mobile environments
Browsing: Data Protection
Tripwire, Inc., announced the results of research on risk-based security management in the healthcare and pharmaceutical industries.
Security professionals are the paranoid type anyway and I’m pretty sure they questioned this before, but now their paranoia can be justified.
In response to the news that Yahoo has announced plans to encrypt all internal traffic following the National Security Agency disclosures by Edward Snowden
Proper session management is an ongoing challenge for mobile application developers. It’s not uncommon for mobile apps to have multiple session management errors, putting the application at risk.
Under a project codenamed MUSCULAR, the NSA sought to work around the restrictions of PRISM, another NSA info-sharing program
Microsoft is planning to increase its use of encryption in a bid to thwart the pervasive internet surveillance being practised by the NSA and the UK’s GCHQ
Unique FIPS certified and PIN activated USB flash drive datAshur recognised for robust security at the 2013 BCS & Computing UK IT Industry Awards London
For the past five years, Chris Hadnagy, Chief Human Hacker at Social-Engineer, Inc, has run an unusual competition at Def Con. Called Social Engineering Capture The Flag
Former Lavabit proprietor Ladar Levison claims the new Dark Mail initiative he’s cooking up with the team from Silent Circle will enable email that’s virtually spy-proof, but according to at least one expert