Van Wyk: Security Track Record for iPhone Not an Accident
It’s not just luck. Apple has managed to keep the iPhone (and its iOS brethren) safe from any major malware outbreak for 10...
Survey: Ex-employees Keep Access to Corporate Apps, Data at Half of U.S. Firms
Former employees at about half of U.S. companies still have access to corporate applications after they leave their jobs, according to new...
Patch Now: Cisco Closes Nine Serious SNMP Holes in IOS, IOS-XE
Cisco Systems this week issued patches for a series of critical SNMP vulnerabilities in its popular IOS and IOS-XE network infrastructure...
February 23, 2017 | Malware and Advanced ThreatsBy Kevin Beaver, IANS Faculty
State-sponsored attackers are, by definition, highly skilled and highly funded. How can we keep up? In this report, IANS Faculty Kevin Beaver details the challenges around state-sponsored hacking, including the threats, vulnerabilities and risks that must be addressed, starting today, if organizations are going to stay off their radar.
— CLIENT PORTAL —>
Please Login to continue
| Faculty Report
IANS Vulnerability and Breach Update: Q2 2017
Mark Clancy on the Petya-like GoldenEye Attacks and Tough Choices in Enterprise Defense
GoldenEye Ransomware Wreaks Havoc on Global Networks
Comparing Email Security Solutions