Here's an overview of some of last week's most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman Foeckl, CEO of CoSoSys, illustrates the most prominent endpoint security myths and explains why they persist.
Week in review: Google catches India with fake certificates, and the risks of selling used smartphones
Here's an overview of some of last week's most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.
Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT
Here's an overview of some of last week's most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, Security Innovation Manager at Check Point, talks about the role of threat intelligence in the modern security architecture, discusses how it can help identify sophisticated malware attacks, and illustrates the essential building blocks of a robust threat intelligence solution.
Week in review: “Lawful interception” mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE Magazine
Here's an overview of some of last week's most interesting news, articles and interviews: (IN)SECURE Magazine issue 42 released (IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics.
Week in review: GCHQ intercepts Google, Facebook users' communications, Code Spaces destroyed by extortion hack attack
Here's an overview of some of last week's most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here are five rarely implemented security practices that offer great security benefits, but which few people actually apply in real life.