Posted on 1st Jun 2011 by Gemalto
In an increasingly digital and cloud-based world, as we hand over our relationship status and birth dates to Facebook, log our whereabouts on Twitter and Foursquare, upload our photos to Flickr and work off the corporate network from an airport, café or at home, there is one thing we refuse to let go of: gadgets.
Posted on 31st May 2011 by Gemalto
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.