All Posts (2226)

Sort by

2012 Trend and Risk Report

Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated wit

Read more…
Views: 289
Comments: 0

Emerging Cyber Threats

With the Internet’s pervasive reach into business, government, and private life, it is unsurprising that cybercrime and espionage not only continue to evolve, but that new techniques are quickly adopted.

Today the cyber threats are constantly changing

Read more…

An Overview on Cloud Security

Overview on Cloud Security

Cloud adoption is an inevitable choice in today’s dynamic environment, yet many organizations are hesitant to fully leverage the benefits of the cloud, considering concerns regarding data loss and unauthorized access .

Tod

Read more…

Certification: ISO 27001

ISO 27001 certification in brief

  • ISO 27001 formally specifies a management system that is intended to bring information security under explicit management control.
  • Being a formal specification means that it mandates specific requirements.
  • Organizati
Read more…