In life, there are a handful of people that each of us truly trust – and can confide in fully. And, it’s safe to say, you’ve probably taken into consideration the trustworthiness of each one of your confidants. Maybe you’ve evaluated them on their ability to keep secrets in the past or perhaps they each […]

The way parents use Twitter and the way teens use Twitter couldn’t be more different. While many parents turn to the popular social channel for business networking, teens use Twitter to simply hang out—to see and be seen. They chat, joke, banter, and of course, they love to subtweet. Subtweeting is indirectly tweeting something about […]

The good, bad, and potentially worse of critical infrastructure protection. There has been a significant post-9/11 focus on securing critical infrastructure systems – many of which pre-date the Networked Age and were potentially more vulnerable to attack that newer networked systems. Cyber-attacks on critical infrastructure systems have not yet resulted in the loss of human […]

Limiter et protéger votre entreprise contre les attaques de type Dridex peut se faire à différents niveaux d’interception : Fichiers, Registre, URL et IP, et celà à travers plusieurs technologies des gammes de produits Intel Security. La protection contre ce type de codes malveillants extrêment volatile nécessite une approche multi niveaux et une coordination entre les différents […]

Governments globally need to focus on the unintended consequences of across the board attempts to deal with deficit spending.  Saving pennies is important, but we need to make certain those savings do not cause large consequences for security that will cost much more in the long run. Cyber data breaches are a prominent topic this […]