Expert corner

 
 
Black Hat USA 2016
Google Chrome

Google Chrome users targeted by tech support scammers

Google Chrome users, beware: tech support scammers are misusing helpful browser features to impersonate Microsoft and to bombard users users with pop-ups. In the first instance, the scammers are taking advantage of the browser’s …

BYOD

How much of a risk is BYOD to network security?

We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as a result of device software not being regularly …

Armor

Data protection for any cloud, anywhere

In this podcast recorded at Black Hat USA 2016, Jeff Schilling, CSO at Armor, talks about Armor Anywhere, which provides user-friendly managed security, with visibility and controls to ensure the protection of workloads, assets and applications. …

CSA book

100 best practices in Big Data security

The Cloud Security Alliance (CSA) released the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in Big Data security. The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and …

 
 

Don't miss

Malware news

Privacy news

 
 
Black Hat USA 2016