Richard Moulds of Thales e-Security comments on an important partnership between Gem and Thales to bring HSM security to Bitcoin transactions and wallets.
Browsing: Phishing
Richard Pharro of APM Group weighs in on findings that many of the data breaches of 2014 were caused by internal intrusions or employee “human error”.
Rob Miller comments on the recent disclosure of another vulnerability found in industrial control system (ICS) software.
Acumin has put together an infographic on eight of the worst computer viruses.
Andrew Mabbitt of MWR InfoSecurity comments on the news that Chinese spies have reportedly stolen the designs for Australia’s new warplane.
Research by Wombat Security Technologies and the Aberdeen Group shows that organizations can reduce the risk of a breach by implementing security education.
Matt Zanderigo of ObserveIT discusses how people, activity, and applications assembled together into a “security threat trifecta” for organizations.
Phil Beckett comments on the latest news that the Serious Fraud Office (SFO) has made its first convictions under new anti-bribery laws.
Toby Scott-Jackson of SureCloud has listed the top vulnerabilities to look out for that could pose a serious barrier to PCI compliance for call centres.
Ponemon’s latest research quantifies a point that we’ve all come to understand: the cost of data breaches is increasing for organizations of all sizes.