Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…

Read More

Over half of small businesses surveyed by the Ponemon Institute as part of a recent study experienced some sort of data breach last year. Out of the affected businesses, a great deal of breaches were ignited internally, either by mistake or on purpose by employees and contractors.

Read More

As companies now face threats from every angle—foreign, national, and internal—there seems to be a “who, me?” attitude when it comes to security. Many companies handle security incidents in a hush-hush manner, quietly sweeping these all-too-common occurrences under the rug, hidden from the public.

Read More