Expert corner

 
 
Black Hat USA 2016
BYOD

How much of a risk is BYOD to network security?

We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as a result of device software not being regularly …

CSA book

100 best practices in Big Data security

The Cloud Security Alliance (CSA) released the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in Big Data security. The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and …

Armor

Data protection for any cloud, anywhere

In this podcast recorded at Black Hat USA 2016, Jeff Schilling, CSO at Armor, talks about Armor Anywhere, which provides user-friendly managed security, with visibility and controls to ensure the protection of workloads, assets and applications. …

 
 

Don't miss

Malware news

Privacy news

 
 
Black Hat USA 2016