Businesses across Europe would be advised to realize the risks to their sensitive information and enact changes to meet the new EU data protection reforms.
Browsing: Malware and Vulnerabilities
SafelightSecurity provides a few tips to help keep the business and personal data stored on your iPhone safe.
When we start mapping our efforts to the attacker’s infiltration steps (known as the cyber kill chain), we can focus our incident response efforts.
IronKey and Rapid7 comment on the development of BadUSB, an exploit that modifies the controller firmware on USB devices.
Experts in the information security field comment on the Supervalu data breach.
Google has announced that it will lower the search ranking of websites that don’t use encryption in order to promote better online security practices.
Despite the need to focus on information security, a full-time information security manager might not be the best use of your organization’s resources.
This September, Caxton Group will host its flagship event in Abu Dhabi, UAE for cyber security in the energy and utilities sector.
At Black Hat, ForeScout Technologies announced new ControlFabric integrations with Rapid7 Nexpose and ThreatStream.
The energy sector will need to rely on IT security best practices to protect against cyber threats and keep the positive energy flowing.