Recent hacks on celebrity photo breaches through Apple iCloud accounts have done much to expose the vulnerabilities of consumer cloud tools- and...

Security must move from ‘cleaning up after the breach’ to ‘empowering digital businesses’ 

With the advent of highly virulent and aggressive breeds of mobile malware, experts have varying opinions on exactly what form the next generation...

How to manage encryption sprawl in the enterprise

Patching up holes in the IT security blanket

Many organisations fail to ensure that access to corporate data is terminated along with employee contracts

Large enterprises can use honeypots as a means to detect and monitor any attempts at illegitimate access to sensitive data and including some...

With no shortage of DDoS attacks overwhelming the news headlines, many businesses have been fast to question whether they are well protected by...

It might sound like a bad movie, but it’s playing out in real life – despite what seems like endless cyber-attacks using SQL injection, SQLi...

Pages