GUEST OPINION by Greg Wyman, Bufferzone Security: Organisations can train users all day, every day, but humans are humans. It’s never possible to train 100 percent of users to identify and never click on an (unknown) malicious link, or open a potentially harmful email attachment.
VENDOR NEWS by Greg Wyman, Bufferzone Security: Organisations can train users all day, every day, but humans are humans. It’s never possible to train 100 percent of users to identify and never click on an (unknown) malicious link, or open a potentially harmful email attachment.
GUEST OPINION by Greg Wyman, Bufferzone Security: The world of cyber security has become increasingly complex in past years. Endpoints continue to be the vector that most attackers and hackers use to breach an organisation.
GUEST OPINION by Greg Wyman, Bufferzone Security: The world of cyber security has become increasingly complex in past years. Endpoints continue to be the vector that most attackers and hackers use to breach an organisation.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]