Pen testing differs from other security measures in that it proactively seeks to emulate the enemy.
Browsing: GRC
Protecting your Smartphone with a strong password or pattern is one of the simplest ways to strengthen the access security of your Smartphone.
In September 2013 the ISO/IEC 27001:2005 standard was replaced by the new version, ISO/IEC 27001:2013
Banks and financial services organisations have been a prime target for hackers for a very long time
The CSA is investing heavily on the SDP concept hoping it will solve some of the security challenges presented by cyber criminals, threats, and governments.
Like a lot of our fellow information security professionals, we’re once again attending the RSA Conference, being held this week in San Francisco.
AccessData have announced the InSight™ Platform, a cybersecurity system enabling enterprises to adeptly manage the accelerating volume of data incidents
Industries today are composed of finely automated sectors, which are operated by interconnected, self-regulating systems known as industrial control systems
Large numbers of organisations are still dissuaded from investing due to the perceived cost and complexity of the technology
There is no shortage of advice on data protection, staying safe online, avoiding phishing attacks and combatting malware.