By correlating the data, Websense has demonstrated how any attacker intercepting this data can create a precise blueprint of the target’s hardware
Browsing: Malware and Vulnerabilities
McAfee Labs has released its 2014 Predictions Report, analyzing 2013 to forecast the threat landscape for the coming year.
A Brief History of Ciphers – This infographic from CipherCloud starts 1900 BC & covers a brief outline of the history behind Ciphers until 2010.
Following news that Skype social media platforms were hacked by the ‘Syrian Electronic Army’, here are some thoughts and opinions
Encryption keys stored by the same CSP that stores your data are easier for government agencies to acquire.
The new and updated version of the PCI Data Security Standard is as much about refining and improving the protection afforded by the DSS
These information risks include using a personal email account to send and receive work documents
There are many hot button topics in the realm of technology that, depending on how you move forward, could impact your business in a positive or negative manner.
Suffice to say that, in order to exercise due diligence and care, you need to plan for the day you can’t – in other words, a business continuity plan.
Every year brings a fresh round of cyber security challenges & this year is sure to be no different.