Browsing: Information Security
75% of organisations lack complete confidence that their security defenses will stop targeted spear-phishing with malicious web links Mimecast has announced…
NIST has announced the final public draft Special Publication 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations–A System Life…
Download the Latest Draft Cybersecurity Practice Guide We are excited to announce the release of draft National Institute of Standards…
Auditors are increasingly being required to audit cybersecurity processes, policies and tools to provide assurance that their enterprise has appropriate…
Mike Hooper, Director of Digital Transformation (APAC) at OpenText A day in the life of the intelligent and connected enterprise…
By Milica D. Djekic According to a definition, the insider threats are that potential of individual to misuse his authorized or…
By Vikram Sharma, Encryption Expert and CEO and Founder of Quintessence Labs For me, this is a particularly exciting time in the history…
McAfee Researchers Analyse Cryptomining Malware Trend, Windows 10 Cortana Vulnerabilities, Blockchain Attack Vectors, Mobile Billing Fraud Apps, and the Weaponisation…
The proliferation of wireless and bring your own device (BYOD) endpoints means corporate networks depend more on wireless networks. Securing…
Where are the hordes of cold and scary European privacy policy enforcers? Can you see them slowly roaming and moaning…