Mark Kedgley of New Net Technologies urges us to stop pretending that current security policies can stop any breach from working its way into key systems.
Browsing: Forensic
Phil Beckett, partner at Proven Legal Technologies, considers the rise in cyber security threats and what firms must do to protect themselves.
There are many reasons businesses need to protect themselves from a possible data breach via third-party data recovery providers.
Services such as Optimise Direct are an important way for us to blend security and cost savings together and thereby create SaaCS.
For the last decade or so, the infosec and cyber security industry seems to have lacked vision when it’s come to anticipating new attack vectors and risks.
Proven Legal Technologies has revealed 10 of the worst searches made by businesses during e-disclosure investigations.
Researchers at Kaspersky Lab have discovered a piece of malware infecting ATMs that allow attackers to empty ATMS, stealing millions of dollars.
Experts from a variety of leading information security companies comment on the recent revelations regarding this summer’s breach at JPMorgan Chase.
A few weeks ago, the US-CERT issued an updated advisory warning that the Backoff Point-of-Sale malware continues to evolve.
Authentify discusses the average costs of data breaches, including how consumers end up paying for these incidents.