Posted on 27 May 2011 by Neville Pattinson
Now that Pres. Obama has signed the National Strategy for Trusted Identities in Cyberspace (NSTIC), it’s time for the government and private sector to work together to build the ecosystem. Where do we start?
Posted on 31 May 2011 by Thales DIS
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.
Posted on 10 June 2011 by Thales DIS
It is critical that consumers are certain that the site they visit is the one they intended to access. A new policy signed by the Obama Administration will change the way we do business on the internet.
Posted on by Thales DIS
SC Magazine recently took a look at Barclays’ latest effort to inspire security consciousness amongst its staff. As employee awareness initiatives go, this is an innovative and ambitious project. In essence though, Barclays’ new strategy has at its core what many other analysts and experts have told us in the past: that encouraging proactive behaviour among staff is the key to effective security in the enterprise.
Posted on 17 June 2011 by Ken Abbott
[Video] Xavier Larduinat explains how the A.T. Kearney award recognizes more than just one bright idea for a product.
Posted on 07 July 2011 by Thales DIS
The Americas are no different from other parts of the world – online banking is becoming second nature. The latest instalment of our world tour of ebanking security features cases from across North & South America including Mexico and the USA.