Technology -> Security
Hiding malware using steganography
Steganography - the art of hiding a message within another message - is nothing new. During World War II, the French Resistance sent messages written on the backs of couriers in invisible ink.
Andrew Hay, Director of Search Research, OpenDNS | 27th August 2015
The rise of digital natives and their enthusiasm for cloud services
As digital natives enter management positions and shadow IT deployments become an accepted norm, the choice is no longer whether or not to adopt cloud-based services, but about how secure their use us.
Bob Tarzey, Quocirca | 19th August 2015
Securing the Internet of Things - time for another look at Public Key Infrastructure (PKI)?
The increasing use of the IoT to support a wide range of business processes has huge potential value for businesses; however, it also opens up a new security front that has led to renewed interest in Public Key Infrastructure (PKI).
Bob Tarzey, Quocirca | 18th August 2015
Confidence in data security part 2 - Weak links
All organisations are dependent on information supply chains; these improve customer communications and business processes. However, to exploit information supply chains to the full requires confidence on data security.
Bob Tarzey, Quocirca | 17th August 2015
Confidence in data security part 1 - Room for improvement
Improving user knowledge, deploying advanced technology and co-ordinating incident response and policy all make a big difference in the level of confidence organisation have about data security
Bob Tarzey, Quocirca | 11th August 2015
Are retailers being left exposed to the weak link in the PCI/P2PE chain?
Since the creation of bank cards and electronic financial transactions, fraud and data security have been constant concerns for customers and organisations alike.
Alan Watson, Barron McCann | 5th August 2015
Business headlines from BBC News:
Published by: electronicdawn Ltd.