It’s been long known that cyber-criminals utilize advanced information-stealing malware and Trojans to gain access to corporate endpoints and networks, disrupt operations and steal sensitive business data, intellectual property and financial information.
Browsing: Identity and access management (IAM)
LONDON, November 5, 2013 – Lancope, Inc., a leader in network visibility and security intelligence, announces the appointment of Dan Sibille as vice president of channels.
The U.S. National Security Agency has penetrated the main communication links that connect Yahoo and Google data centers around the world, giving it access to the accounts of hundreds of millions of people including U.S. residents
Remember that Adobe security breach from earlier this month that leaked the account records of some 3 million customers? Scratch that; the actual number was
A few years back Google got into fearful trouble by recording the location of WiFi transceivers without asking for their owners’ permission.
The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information.
Buffer, a social media app, allows its users to schedule and automatically post updates to social media sites such as Facebook and Twitter.
Professional networking giant LinkedIn is the subject of much criticism for its new LinkedIn Intro offering for lapses in privacy and security, and is being described as the equivalent to a Man-in-the-Middle (MitM) attack.
In recent months, I’ve started to take my own digital security much more seriously. I encrypt my e-mail when possible, I’ve moved away from Gmail, and I’ve become much more vigilant about using a VPN nearly all the time.
Digital forensics refers to the processes involved in examining data from harddrives, volatility memory (RAM), network captures, and a wide range of digital devices for artifacts that remain after specific actions occurred on a system.