Pen testing differs from other security measures in that it proactively seeks to emulate the enemy.
Browsing: Malware and Vulnerabilities
54 percent of companies in the UK are using incorrect metrics when trying to determine their IT security status
Willie Sutton responded when asked why he robbed banks, his simple and eloquent answer was ‘Because that’s where the money is’.
Only 37 percent of users perform annual security assessments, and most users do not contract a third party to test their existing PACS.
On March 27, a sandboxing technology provider published a white paper regarding 11 zero-day vulnerabilities they discovered in 2013.
As the infographic shows, the explosion in the popularity of Bring Your Own Device (BYOD) can be attributed to a number of things.
Since January 2013, 48 data breaches have occurred in the education sector, including K-12 and higher education institutions
Kaspersky Lab has launched an interactive cyberthreat map that visualises cyber security incidents occurring worldwide in real time.
Protecting your Smartphone with a strong password or pattern is one of the simplest ways to strengthen the access security of your Smartphone.
Websense have released the Websense® Security Labs™ 2014 Threat Report, documenting the latest shift in complex attack trends