|
GUEST OPINION by Greg Wyman, Bufferzone Security: Organisations can train users all day, every day, but humans are humans. It’s never possible to train 100 percent of users to identify and never click on an (unknown) malicious link, or open a potentially harmful email attachment.
VENDOR NEWS by Greg Wyman, Bufferzone Security: Organisations can train users all day, every day, but humans are humans. It’s never possible to train 100 percent of users to identify and never click on an (unknown) malicious link, or open a potentially harmful email attachment.
GUEST OPINION by Greg Wyman, Bufferzone Security: The world of cyber security has become increasingly complex in past years. Endpoints continue to be the vector that most attackers and hackers use to breach an organisation.
GUEST OPINION by Greg Wyman, Bufferzone Security: The world of cyber security has become increasingly complex in past years. Endpoints continue to be the vector that most attackers and hackers use to breach an organisation.
Not for the first time the High Court has merely highlighted a flaw in one of our long standing laws[…]
I just watched the UK TV series The Undeclared War. It's a fascinating play on the theme of cybersecurity --[…]
Fav class is Mage, Fav deck is anything that uses random spells, I make my own decks I don't net[…]
Proving once more that this saga is as much about his celebrity lawyers as it is about securing Assange’s freedom.[…]
Fav deck at the moment is Miracle Rogue and my fav card of all time is Coldlight Oracle.