Mobile interfacing with IoT
The security community is abuzz about the risks of reverse engineering code.
The security community is abuzz about the risks of reverse engineering code.
It is an assumption for many enterprises operating today that they may already have been compromised.
In this month’s “Me and my job” feature, we get to know Johannes Ullrich of the SANS Technology Institute.
The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.
To what extent is state-sponsored cybercrime extending the protection for hackers who operate outside U.S. borders? Karen Epper Hoffman investigates.
Queens College found a solution to monitor activity and manage devices on its network, reports Greg Masters.
Sharing lessons learned with managers and staff is key to halting breaches, says Lena Smart, CIO, New York Power Authority. Steve Zurier reports.
The challenge for security practitioners is to make the mobile ecosystem more trustable, reports Alan Earls.
Given the recent headline-grabbing breaches, in this month’s debate information security professionals discuss whether or not money is safe online.
Threats loom heavily on the minds of those charged with keeping critical data safe from bad actors, says Illena Armstrong, VP editorial, SC Magazine.