Charlotte Marshall of Iron Mountain discusses the EU’s plans to remove the final obstacles to integrated cross-border adoption of digital signatures.
Browsing: Strategy and Planning
Experts from the information security industry comment on the Sony hack.
Carmine Clementelli, a security expert and manager with PFU, a Fujitsu Company, discusses what we know about the Guardians of Peace and the Sony hack.
Stephen Morrow, Head of Security Services at SQS, reminds us of how and why security is a crucial factor when developing software.
Intel® Security has released its McAfee Labs’ November 2014 Threats Report, including an analysis of threat activity in the third quarter of 2014.
A number of information security professionals comment on retailers’ security update “freeze” for the holiday season.
Corero Network Security provides a few tips for how organisations can brace themselves to effectively identify and mitigate the risk of DDoS attacks.
Rick Delgado discusses a few things businesses can do to get started on their BYOD security.
Wisegate Editor-in-Chief Elden Nelson reveals the top takeaways from a BYOD roundtable on best practices for a BYOD policy.
Databarracks talks cloud disaster recovery and other predictions for 2015.