
End user security requires layers of tools and training as employees use more devices and apps
/
0 Comments
A posting from Dark Reading in there Endpoint security section:…

LinkedIn flips the two-factor authentication switch
A posting from Naked Security on LinkedIn authentication: Happy…

Not good enough, Oracle – promises to secure Java are too little, too late
An interesting article from Naked security: Oracle has promised…

Social Engineering: Tips to Protecting Yourself
In the world of information security, ‘social engineering’ is a term that describes a non-technical way of hacking that relies on the hacker to collect information to bypass normal security controls. It is the art of manipulating users into performing actions or divulging confidential information.

GovSec – The SecurityOrb Show: Interview with Curtis KS Levinson about GovSec
GovSec - The SecurityOrb Show: Interview with Curtis KS Levinson about GovSec

APT Attacks Trace To India, Researcher Says
A posting from information week on APT Attacks : A multi-year…

3 Lessons From Layered Defense’s Missed Attacks
a posting from Dark Reading in there Vulnerability Management…

Gathering More Security Data From Your Endpoints
A posting from Dark Reading in there Endpoint Security section:
Even…

Anatomy of a change – Google announces it will double its SSL key sizes
A posting from Naked Security on Google announces it will double…

Phishers try flattery with Facebook Page owners
An interesting article in Naked Security on Phishers try…
