Entries from 2014-10-06 to 1 day
Internet security has reached the highest defcon level. Another day, another hack – the new bug on the scene known as “Shellshock” blew up headlines and Twitter feeds.Shellshock exposes a vulnerability in Bourne Again Shell (Bash), the wid…
Security services have seen advances in identity and access management services; however, encryption services are lagging in the security industry. According to Gartner, revenues for identity and access management (IAM), remote vulnerabili…
Every year billions of dollars are lost due to financial fraud and digital fraud has become one of the target markets for fraudsters. The best weapon for today’s business environment is big data and analytics supporting a robust data loss …
Cloud service providers can make many promises regarding their data center’s physical security, but it is vital that you are able to understand the logical, remote and application dimensions to cloud security in that provider’s cloud stack…