The past year has been tumultuous in the world of IT security. Though IT security is always host to a…
Browsing: Strategy and Planning
Research exposes gap between reality and expectations, with CIOs admitting they do not proactively hunt for threats, yet expect to…
Security experts from VASCO Data Security, Balabit, and STEALTHbits Technologies have the following comments on DoJ Court action against Apple.…
Why is Identity and Access Management (IAM) important as a business security framework? These days, companies are securing more users…
IT audit leaders and functions are at the forefront of providing confidence over the technological change revolution occurring across all…
The busiest season of the year for many businesses is without a doubt, the festive period. Retailers and couriers across…
Hollywood Presbyterian Medical Center in Southern California had its systems hacked and held for ransom causing the hospital to declare…
As reported by the BBC, a major computer security vulnerability has been discovered – with experts cautiously warning it could…
The BBC has reported an attempt to spread a powerful form of Android malware via text messages. Mazar can gain…
With $4.45 billion spent during a major online shopping weekend in November 2015 alone (Fortune), it’s clear that the need…