Balancing mobility risk with data needs

Balancing mobility risk with data needs

“We are living in a connected world. People are using a number of smart devices to remain in touch with not only family and friends but also with their employers. This flexibility gives them the ability to access vital data whether they are in the office or watching...
Warning: Exponentially expanding data

Warning: Exponentially expanding data

By Gary de Menezes At the turn of the previous century, fears ran rampant that PCs would fall victim to the fabled Y2K bug, plunging a computer-dependent world into instant chaos. That may have been a storm in a teacup, but now there is a very real consideration that...
How to find a ‘super hacker’

How to find a ‘super hacker’

It doesn’t matter how careful they are, ‘super hackers’ will leave a trace of their activities. Windows event logs, DNS logs and DHCP logs – sources not normally analysed from an attack detection perspective – all hold clues to the clandestine...