UK office workers have trouble deciding who to trust, however this isn’t surprising considering 14 percent have already been badly affected by cybercrime
Browsing: Threat Intelligence
The advent of successful Cyber Crimes has driven their increased focus upon CSIRT, First Responder Capabilities, and the application of Digital Forensics.
Foreign intelligence agencies are targeting IT workers at big businesses, hoping to recruit them and gain privileged access to sensitive computer systems.
The Windows XP debate is an interesting one, and when one considers there are significant numbers of clients still installed
Comprehensive, real-world network testing is a critical step in ensuring that networks perform as expected.
As our research team reveals in our Hacker Intelligence Initiative Report, some APTs are relatively simple to execute
We all use signatures. Signatures here, signatures there. They grant authenticity and trust, among other things, or at least they’re supposed to.
Websense, Inc. is a global leader in protecting organisations from the latest cyber attacks and data theft.
Today’s NAC solutions are capable of providing appropriate access to network resources based on the identity of the device, functionality and state.
‘Did I tell you that I was a Brain Surgeon? – Yes I am – I paid $550 [US] took a weekends course, and now I am ready to operate on any passer-by.