In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this year,...
If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure. Unless you are absolutely, positively certain that you will never, ever put anything in there that you wouldn’t want to find in a public place, you’re going to...
In the past few days, we learned that Global Payments Inc, a middle-man credit checking company, suffered a breach of its systems starting in January of this year. It has been speculated that up to 10 million card holders might be at risk. Even with the growing trend...
Despite the significant uptick in information security events on display thus far in 2011, and despite the diversity and caliber of organizations that are being breached, it seems that too many organizations are failing to learn the lessons of the victims. More than...
Why should you take your organization’s information security posture seriously? Just ask Sony. It has been estimated that Sony will spend more than $170 million dollars due to the recent breaches they have suffered. Personally, I think that the...