Could the IT DMZ be used as a model for controlling payment card fraud and help protect against skimming attacks like those at Barnes and Noble?
Archives for October 2012
Our common stereotypes of social engineering attacks don’t match up to the latest data in the Verizon 2012 Data Breach Investigations Report.
Can the rate of vulnerability disclosures of a platform predict its position on the Hype Curve?
RSA announces a new offering to protect password credentials. But is protecting the password file really that difficult?
The 2012 Global Reputational Risk and IT Study calls into question the assumption that IT security incidents have only temporary impact on reputation.