Poulin: You Mod it, You Own It?
If your toaster catches fire because of a design defect, you can sue the manufacturer. If your computer is compromised because of a...
Van Wyk: Security Track Record for iPhone Not an Accident
It’s not just luck. Apple has managed to keep the iPhone (and its iOS brethren) safe from any major malware outbreak for 10...
Survey: Ex-employees Keep Access to Corporate Apps, Data at Half of U.S. Firms
Former employees at about half of U.S. companies still have access to corporate applications after they leave their jobs, according to new...
April 3, 2017 | Malware and Advanced ThreatsBy Mike Saurbaugh, IANS Faculty
A new vulnerability or breach seems to be discovered daily, but which should be taken more seriously and which are overhyped? In this report, IANS Faculty Mike Saurbaugh looks back over the major breaches and vulnerabilities of the past three months, explains them and provides real-world context and perspective.
— CLIENT PORTAL —>
Please Login to continue
| Faculty Report
IANS Vulnerability and Breach Update: Q2 2017
Mark Clancy on the Petya-like GoldenEye Attacks and Tough Choices in Enterprise Defense
GoldenEye Ransomware Wreaks Havoc on Global Networks
Comparing Email Security Solutions