Unlike the traditional ‘stop-start’ approach to vulnerability management driven by snapshot scans, continuous detection and mitigation of vulnerabilities
Browsing: Forensic
‘Did I tell you that I was a Brain Surgeon? – Yes I am – I paid $550 [US] took a weekends course, and now I am ready to operate on any passer-by.
In this article I am referring to this as OSINT, and an established process of a Security Triage to discover what you don’t know
At its simplest, eDiscovery is a term used to describe actions taken to collect, sort, identify and understand information stored on computers
The only question they had was ‘who had leaked this information from the plant’ a question I can attest was never satisfied.
Willie Sutton responded when asked why he robbed banks, his simple and eloquent answer was ‘Because that’s where the money is’.
It is looking like the new Bahrain CyberCrime law is going to set the demographic bar for those Hackers and Hacktivists who are found to be culpable
One upon a time electronic tracking person [target] was expensive, and difficult to achieve, but with the advancement of technology
Tenable SecurityCenter Continuous View is First to Integrate Threat, Compliance and Vulnerability Management Capabilities
Like never before, a perfect set of conditions for cybercrime are upon us in 2014. To see it in its entirety, we must look at all factors