Human nature being what it is, you pretty much have to run wireless monitoring for intrusion detection and prevention even if you have a “no-Wi-Fi” policy. You need to make sure that no one has ...
You’ve just learned that a new worm from a former Soviet country is spreading fast because it doesn’t rely on e-mail – it automatically exploits a vulnerability in Microsoft’s Internet Information ...
An evolving array of cybersecurity threats are putting the financial, operational and reputational stability of organizations at risk. Comprehensive security strategies and governance that ensure ...
Everyone is rushing to build a mobile application for their business. John Dickson of the Denim Group advises asking IT and marketing folks these eight security-related questions before you go any ...
Intelligent physical security system devices—especially AI-enabled video cameras—have become high-value targets for hackers, who now deploy malware explicitly designed to infect these devices and lie ...