A Brief History of Ciphers – This infographic from CipherCloud starts 1900 BC & covers a brief outline of the history behind Ciphers until 2010.
Browsing: Malware and Vulnerabilities
Following news that Skype social media platforms were hacked by the ‘Syrian Electronic Army’, here are some thoughts and opinions
Encryption keys stored by the same CSP that stores your data are easier for government agencies to acquire.
The new and updated version of the PCI Data Security Standard is as much about refining and improving the protection afforded by the DSS
These information risks include using a personal email account to send and receive work documents
There are many hot button topics in the realm of technology that, depending on how you move forward, could impact your business in a positive or negative manner.
Suffice to say that, in order to exercise due diligence and care, you need to plan for the day you can’t – in other words, a business continuity plan.
Every year brings a fresh round of cyber security challenges & this year is sure to be no different.
Smartphone theft has surged in recent years to become a scourge of everyday life, and Kaspersky is warning that this Christmas users need to get protected
Brian Krebs last week reported how a botnet was enlisting Firefox users to hack websites.