Welcome to the new security blog, a group effort from the analyst security team at Bloor.
Cloud security brings many advantages, not least of which is the ability to access the services from any device and location, allowing for greater...
Smartphone use and security was debated by a panel I ran at the Infosecurity Europe
....recent reports from Trusteer would suggest so. After gaining access to web server logs from phishing sites they found that;Mobile users are the...
Shrinkage in the retail industry is a major problem. Automated user activity management technology can provide a solution to the problem.
What exactly is the truth behind cybercrime and hacktivism?
Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate...
So Stuxnet hit the TV news again last night as it was announced that Cybercriminals have got hold of the Stuxnet virus. I watched a Sky News package...
To guard against the threats being seen today, anti-virus technology alone is insufficient. A better strategy is to deploy an arsenal of unified...
Uptake of DNSSEC is growing rapidly, but it still remains something that is not all that well understood. This paper explains what it is in layman's...
Here's an interesting story that has recently emerged. It's great to see some useful research into privacy issues and mobile phone applications. By...