Bring-your-own-device (BYOD) is an unstoppable force, but organizations need to take a close look at security and move beyond mere password...
Black Hat and Defcon are notoriously lawless. If you can't be convinced to just stay home, follow these tips before heading to the conferences.
A preview of the discussion on persistence mechanisms used by bootkits to be presented at the HOPE X conference on July 20 in New York City.
Business, like all of social life, depends on networks of trust, and the great challenge for IT systems is building those networks.
The Information Security LinkedIn group has just release a new survey of its community on the state of bring-your-own-device (BYOD) initiatives.
Cyber security is center stage in the world today, thanks to almost continuous revelations about incidents and breaches. In this context of unpredictability and insecurity, organizations are redefining their approach to security, trying to find the balance between risk, innovation and cost. In this webinar, Erik Van Ommeren, Director of Innovation, Sogeti and Martin Borrett […]