Don’t let the Internet of Things Catch You by Surprise

You can’t turn anywhere without hearing about the Internet of Things. But does all of the ...

Healthcare Industry: In Need of Security Medicine

As part of an ongoing series, we’re examining the security and compliance needs and ...

Financial Services: High-risk security, by the numbers

Our latest addition to the industry-by-industry security analysis series is financial ...

Oct 15, 2014

SSL v3 vulnerability: this POODLE eats secure cookies

What this is: A method to compromise communication encrypted by SSL v3 (meaning: access ...

Oct 15, 2014

SSL v3 Vulnerability - Remedies and What You Can Do

  If you are running systems that maintain SSL 3.0 compatibility, you are advised to define ...

Shadow IT and Educational Moments

One of the most serious security challenges for enterprises today is the ease with which ...

Manufacturing: Big Industry, Big Security Challenges

In this latest installment in our series of profiles on security and compliance issues and ...

Oct 02, 2014

Managed Service Providers: drivers for competitive advantages? Part 2

This is a continuation of my previous blog post which aims to discuss the near future ...

Subscribe to Blog Updates

On-demand Webinar

How to build a solid security strategy in the times of ransomware

WATCH NOW