What would happen if hackers got hold of your database of credentials, but discovered that it didn't contain any passwords that were hashed or encrypted? Password hashfiles are the weak... Read more »
Today, many vendors are developing sandboxes to help stem the rising tide of advanced threats. Many vendors claim they can a broad range of advanced attacks. But do they?
Not all sandboxes... Read more »
In the wake of the Target, Neiman Marcus and other retail breaches, banking/security leaders clearly feel abused and frustrated - and they want to see changes in how merchants conduct and process... Read more »
Did you ever count the number of vendors your organization uses to run your business operations? Even mid-sized companies easily exceed one hundred third-party vendors, including technology vendors, electricity, hosting, facilities, payment,... Read more »