Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.
Ellen Messmer |
02 Dec |
No company wants to be associated with a data breach, but if your systems are compromised the fallout can sometimes be more damaging than the act itself.
Matt Rodgers |
22 Sep |
Increasingly, businesses accept the idea that employees should be able to use their personal mobile devices, such as smartphones and tablets, for work. But debate is raging as to whether these employee-owned devices should be managed and secured exactly as corporate-owned devices might be.
Ellen Messmer |
28 Jul |
More Wireless / Mobile Security features
It’s a good time to be a hacker. Maybe.
Craig Searle |
24 Aug |
'A fool pulls the leaves. A brute chops the trunk. A sage digs the roots' - Author Pierce Brown
Carbon Black |
27 Jul |
During a DDoS attack, time can be your biggest enemy. Lost seconds can have a huge impact on whether you are successful in mitigating an attack in time, or failure could mean costly network downtime. Anything that accelerates your Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to an attack provides you with a clear advantage.
Tim Murphy |
24 Apr |
Historically, there’s little love lost between NetOps (network operations) personnel and those in SecOps (security operations).
Mario Vecchio, Big Switch Networks |
12 Apr |
As technology continues to advance, so does the threat of cybersecurity attacks. This will require a drastic shift in perception for Australian businesses: to prioritise prevention, rather than reaction, in order to combat the various complexities of cyber-attacks.
Manish Bahl |
26 Feb |
More Wireless / Mobile Security opinons