Driving backup awareness is a good thing.
Users of screenshot-grabbing-and-easy-sharing app Puush are in danger.
Personal information, passport numbers and visa details of world leaders who attended the G20 summit in Brisbane have been inadvertently leaked.
Tens of thousands of British Airways customers have had their frequent-flyer accounts temporarily frozen in the wake of a security breach.
A critical vulnerability in a popular Internet gateway for visitor-based networks and commonly installed in hotels and convention centers has been discovered.
1 in 3 security professionals recommend negotiating with cybercriminals for the return of stolen data or the restoration of encrypted files. 86% of security professionals believed their peers at other organizations have brokered deals with cybercriminals.
By working with the DevOps team, you can ensure that the production environment is more predictable, auditable and more secure than before. The key is to integrate your security requirements into the DevOps pipeline.
David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.
Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank.
In this interview, Raj Samani, VP and CTO EMEA at Intel Security, talks about successful information security strategies aimed at the critical infrastructure, government challenges, the role of regulation, and more.