TechUK claims standards are patchy throughout England and Wales
IT Personnel Are the Riskiest Business Users
The very people who have the greatest access to company data are those most likely to engage in risky behaviors.
Sony to Fork Out $8 Million on Staff Lawsuit After Cyber Attack
Costs of destructive attack keep mounting
LookingGlass Open-Sources Threat Intel Engine
The idea is to enable threat intelligence providers and security operations to integrate full context across their security portfolios.
Google Taps Centrify for Android at Work
The cloud-based solution provides integrated policy and management across users, apps and devices.
Google Taps Centrify for Android at Work
The cloud-based solution provides integrated policy and management across users, apps and devices.
Businesses Using Millions of Flawed Certificates
Nearly a million SSL certificates found in Netcraft’s October SSL Survey were signed with the potentially vulnerable SHA-1 hashing algorithm.
Businesses Using Millions of Flawed Certificates
Nearly a million SSL certificates found in Netcraft’s October SSL Survey were signed with the potentially vulnerable SHA-1 hashing algorithm.
#ISC2Congress: Current IT Security Process Broke Argues Kapersky Exec
Senior management needs to face up to the fact that it could be throwing good money after bad when it comes to security investment
#ISC2Congress: Cyber-Psychology to Make the Difference in Tomorrow’s Security Organizations
The biggest threat to network security is company employees and firms need to adapt management structures to deal with leaderless environments