Worried about plugging your device into an unfamiliar port and exposing it to horrible viruses or trojans? Simply put this “USB condom” between the male and female ends before docking and the only thing transmitted will be safe, clean electricity.
Browsing: Identity and Access Management (IAM)
Don’t be too hasty to link every Poison Ivy-based cyber attack to China. The popular remote access tool (RAT), which we recently detailed on this blog, is being used in a broad campaign of attacks launched from the Middle East, too.
Google, Iran’s nuclear enrichment plant, the government of Pakistan, the US department of defense… many of the largest enterprises and governments have been victims of Advanced Persistent Threats (APT) during the last two years.
Your status updates and tweets could be revealing more than you think
As businesses embrace BYOD, network engineers have to face up to the security implications of random, roving personal devices connecting to the corporate WLAN and accessing networked applications and data.
Michael Brophy, Certification Europe’s CEO, highlights why the human element is the weakest part of your information security system and sets out how to prevent data breaches.
The certification of a mobile-security sandboxing platform from Good Technology to EAL4+ standards will pave the way for the use of application-isolation techniques to secure mobile and bring your own device
With yesterday’s announcement by Apple of the new iPhone 5S, featuring Touch ID, their embedded fingerprint sensor, we are seeing an important change in the modern authentication landscape.
In their book, “Switch: How to Change Things When Change is Hard” authors Chip and Dan Heath examine how influencing humans to change requires appealing to two parts of the brain: the rational and the emotional.
LONDON (UK) – September 11, 2013 – Varonis Systems Inc. , the leading provider of access, governance and retention solutions for human-generated data, today announced the launch of the Varonis Data Governance Suite 5.9,