Week in review: 1.2B Web credentials stolen, Google Search prioritizes HTTPS websites, and how to foil SynoLocker
Here's an overview of some of last week's most interesting news, articles and interviews: How secure are today's critical networks? In this interview, Dr.
Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program
Here's an overview of some of last week's most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of changing security strategies to protect against the latest threats.
Here's an overview of some of last week's most interesting news, interviews and articles: EFF invites hackers to test, secure its Open Wireless Router The Electronic Frontier Foundation (EFF) has released Open Wireless Router, an experimental alpha release of wireless router software that is meant to improve some and add new capabilities to existing routers.
Here's an overview of some of last week's most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist.
Week in review: Google catches India with fake certificates, and the risks of selling used smartphones
Here's an overview of some of last week's most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.