Security News
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation that enables technology companies, industry stakeholders and esteemed developers to collaboratively identify and fun...
Using encryption to protect mobile traffic and especially the exchange of credentials between the user and company servers should be a must in this day and age. Unfortunately, there are companies that...
Here's an overview of some of last week's most interesting news, podcasts and articles: How data-centric security works In this podcast recorded at Infosecurity Europe 2015, Rui Melo Biscaia, Pr...
Thailand - the land of smiles - invited me as a panelist to the CSA ASEAN 2015 summit. Bangkok, with its fantastic street food, smiling people and general gentleness felt safe and very welcoming this ...
How do you measure the Return of Investment on Data Loss Prevention (DLP) technologies? How do you know that your DLP solution is efficient? In this podcast recorded at Infosecurity Europe 2015, An...
While container adoption is likely to surge in the next few years, concerns around security, certification and adequate skills remain, according to Red Hat. A survey of more than 383 global IT deci...