The Book of Ecclesiastes reads, “Using a dull ax requires great strength, so sharpen the blade. That's the value of wisdom; it helps you succeed.” (10:10) And it may as well work for information security as InfoSec seems to have many areas of practice where we’re busy cutting down trees with dull axes.
The Hidden Costs of Using SSL for Privileged Access Management
[fa icon="calendar'] Jul 7, 2016 9:01:56 AM / by WALLIX posted in Mitigating External Attacks
Acer Computer Maker Gets Aced By Hackers
[fa icon="calendar'] Jun 22, 2016 11:09:25 AM / by WALLIX posted in Mitigating External Attacks
It’s all too familiar, another day another breach. And this time, it's computer manufacturer Acer which will pay the costs...
Left A Job? Handed Back All of Your Employers Data?
[fa icon="calendar'] Jun 7, 2016 2:25:39 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
In our daily lives, we all commit our souls signing a contract of employment. Whether an employee or a contractor, similar rules apply when it comes to respecting company data and the associated data policies.
If A Data Leak Can Happen To Google - What Chance For The Rest Of Us?
[fa icon="calendar'] Jun 2, 2016 8:13:55 PM / by WALLIX posted in Mitigating External Attacks
A few weeks ago, Google’s employee details were leaked by a third party company. Although this was an innocent error, it’s worth considering how much worse it could so easily have been?
The Psychology Of The Cyber Criminal - Part I
[fa icon="calendar'] May 31, 2016 5:32:24 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
We live in an age in which many if not most crimes involve a computer at some point, but we still know very little about cyber criminals and what makes them tick.