
A Case Of Mistaken Identity?
CSN February 5, 2016 News A look inside the role of BlackEnergy malware in the Ukrainian power grid disruption. Co-authored by Raj…
CSN February 5, 2016 News A look inside the role of BlackEnergy malware in the Ukrainian power grid disruption. Co-authored by Raj…
CSN February 5, 2016 News Brainprint. Bee. Lady Gaga. When you read those words, the part of your brain that assigns…
CSN February 5, 2016 News One opinion we’ve expressed quite strongly before on Naked Security is, “Don’t mess with crooks.” There’s…
by Prakash Linga – CTO at Vera – Friday, 5 February 2016. No matter what business you’re in, the one…
CSN February 4, 2016 News Drawing from the financial service industry, this new role uses the “art of the intelligence cycle”…
In 2008, the National Security Agency (NSA) initiated an effort to prioritize the controls within the multiple frameworks to identify…
Asef Sleiman says information security functions are not fully meeting the needs in the region, companies need to focus on…
Now that security breaches are practically unavoidable, organizations must adopt new postures to be prepared for and successfully respond to…
Cars will become increasingly connected through wireless technology and this report “Automotive Cyber Security: Thought Leadership Review of risk perspectives…
It is a simple fact that the number of computer and software vulnerabilities is growing and the sophistication of attacks…