Philip Lieberman of Lieberman Software reveals the myth that “detect and respond” technologies are “silver bullet” security solutions.
Browsing: Strategy and Planning
Vox Mobile has prepared a list of tips that can help you develop an effective BYOD strategy.
A number of information security experts comment on ongoing investigations into a possible data breach at Staples.
David Emm, principal security researcher at Kaspersky Lab, comments on Twitter’s new “Digits” feature.
Veracode has released analytics from its cloud-based platform revealing the vulnerabilities created by the use of open source and third-party components.
While there has been much talk about how Apple Pay might disrupt the payment system, and how easy it will be to use, its security is being overlooked.
McAfee has launched a new report predicting how the next generation of government might look and what the future security challenges might be.
The White House cybersecurity coordinator Michael Daniel is in favor of replacing the password with “selfies” as a means of authentication.
The infamous Sednit cyber-espionage group has recently started to use a new exploit kit to distribute their malware, ESET’s research lab is reporting.
McAfee has developed a guide that will help those selling IT technology and services to the public sector, including SMEs, understand the process.