Video Interview with Chris Potter, PricewaterhouseCoopers Information Security Assurance Partner
by Mirko Zorz - Tuesday, 14 September 2004.
In this video Mr. Potter talks about what can be done in order to minimize the recovery time from an incident, discusses the threat posed by increased mobile computing, the most important step businesses must take in order to manage their information security risks in the future, and more.
Posted on 21 August 2014. | Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.
Posted on 21 August 2014. | An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused for executing MITM attacks, and occasionally additional ones, as well.
Posted on 20 August 2014. | The research revealed that consumers are not only sharing passwords but also potentially putting their personal and sensitive information at risk by leaving themselves logged in to applications on their mobile devices, with over half of those using social media applications and email admitting that they leave themselves logged in on their mobile device.