Due to the constant growth in the number of cyber attacks it is necessary to properly define the actions composing an incident response plan. FireEye firm published an interesting post on the need ...
U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” U.S.-China Economic and Security Review Commission ...
A study conducted by company's enterprise security arm HP Fortify revealed that the majority of mobile apps based on iOS is vulnerable. The company's enterprise security arm HP Fortify conducted ...
Security experts Stewart from Dell SecureWorks and independent researcher David Shearhave explored online underground marketplace for stolen data. Digital identity is one of the most attractive goods ...