In the spirit of this year’s Olympics, which is being held in Rio de Janeiro, we thought we’d host our own little information security Olympic Games.
When it comes to APAC cybersecurity, there is room for improvement. In this feature we take a look at key trends across this region.
Since 2015, thousands of aspiring Pokémon trainers have been waiting for the release of Pokémon GO, which has just launched. Watch out for fakes.
WeLiveSecurity begins a new series of articles showing the different angles that can be taken when tackling a pentest.
If you are traveling this summer and taking your gadgets with you, this guide will ensure that you keep cyber safe when on the road.
The importance of ensuring information security on critical infrastructure has been recognized for years, yet there are still cases that illustrate the need for improvement.
ESET’s Lysa Myers discusses audit logging and how it can help you track and identify security violations, performance problems, and flaws in applications.
In our first post in this series, we talked about authentication. The focus shifts to authorization and access control, says ESET’s Lysa Myers.
It’s hard to protect what you don’t understand. It’s also hard to protect data if you don’t know where it is. ESET’s Cameron Camp looks explores the challenges of data security.
How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.
Yes or no, will your next phone have quantum cryptographic 2FA? If one of the vendors here at RSA has anything to do with it, the answer will be ‘yes’ says ESET’s Cameron Camp.
This year RSA is drowning in buzzword-laden security startups. If you’ve got a next-gen cloud-enabled startup that catches 100% of zero days no has even thought of yet, there’s an RSA booth for you. No track record? No problem. Not sure whether it’s hardware or software? No problem. The problem is that real security is really hard.
It is important to understand how and when an agile approach to deploying your network defenses in real-time should be performed, says ESET’s Cameron Camp.
Whenever there is information that needs to be protected, there is a need to use cryptographic solutions. POS applications are no exception explains ESET’s Lucas Paus.