The industry approach to detecting threats is inherently reactive, ceding the first-mover advantage to the cyber criminals.
There’s a real opportunity now to incorporate the scaling and management (including security management) needs for the IoT in the way we plan our enterprise and consumer services.
People are hoarders by nature. Year after year, we accumulate new things – some that we need, and some that we will never touch again after one use.
Business continuity, the ability of a company to continue or quickly restart operations following a systems outage, tends to be a topic overlooked by business leaders.
Google researchers have asked 231 security experts and 294 web-users who aren’t security experts about their security best practices, and the list of top ones for each group differs considerably: "Experts recognize the benefits of updates—'Patch, patch, patch,' said one expert—while non-experts not only aren’t clear on them, but are concerned about the potential risks of software updates," Google researchers pointed out.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.