Threat Hunting Could Accentuate the Corporate Divide
The idea behind threat hunting is that some attackers are getting too smart for current IT security technology.
Even in Australia, Europe’s New Data Regulation Could Affect Your Business
Talk about the long arm of the law!
The Vulgarisation of IT System Hacking Could Be Good News
Attack sophistication is growing. 20 years ago, social engineering had already made inroads and automated attacks were on the rise, with denial-of-service, browser executable attacks, and techniques for uncovering vulnerabilities in the binary code of applications.
Just Delete It – Destruction as an IT Security Strategy
If confidential information didn’t exist, you wouldn’t have to worry about data breaches.
Dealing with Combined Mobile and Cloud IT Security Problems
Now that so many people and enterprises have rushed headlong into mobile, cloud, or both, it’s time to take a step back and consider your security posture relating to these two items.
Enterprise Attacks that Start in Mobile Apps
Some IT security attacks start from the most innocent mobile apps and in ways that let cyber-criminals simply pick up confidential communications without having to hack into anything at all.