Richard Hibbert of SureCloud reveals that a change of approach can help cast compliance in a more positive light than it is now.
Browsing: Malware and Vulnerabilities
Data-centric security strategies are becoming the de rigueur thinking among thought leaders in information security.
Toby Scott-Jackson of SureCloud has listed the top vulnerabilities to look out for that could pose a serious barrier to PCI compliance for call centres.
Wolfgang Kandek, CTO of Qualys, Inc., comments on the Patch Tuesday for January of 2015.
An infographic explains how the weak points of the internet can be exploited and details who keeps us safe online and how they do it.
Many SMBs are looking to managed security service providers (MSSPs) to help navigate the right approach to security solutions and practices.
Bob West of CipherCloud comments on the Moonpig vulnerability from the belief that companies have an ethical obligation to protect customer data.
David Emm, Senior Security Researcher at Kaspersky Lab, discusses the recently disclosed Moonpig vulnerability.
Thorsten Trapp, Co-Founder and CTO at Tyntec, predicts that the adoption of SMS-based 2FA will see a significant surge in 2015.
Ilia Kolochenko, CEO of High-Tech Bridge, makes some cyber security predictions.