This is one of the most controversial topics in technology – if free open source software is “better” than paid and maintained software. This is a big topic for discussion, but I only want to focus on the security element between Windows/Linux/OS X and iOS/Android.
Category: Best Practice
As usual, there have been a number of announcements regarding Microsoft vulnerabilities and risks over the last few weeks. This episode however is different than the usual list of critical patched or patchable issues and brings some serious underlying issues to light.
In this blog we will endeavour to put the pieces together in order to illustrate the potential risk and identify prioritised mitigation strategies to Prevent, Detect and React.
When exactly did cyber-attacks become part of normal everyday life? I don’t think that there is an exact answer to that question. The main stream media only focus on attacks involving large household brands and they don’t really ever report on smaller companies
Recent research from an SC Media survey of information security professionals provides some insight here, with 43 percent of respondents expecting threat intelligence to offer an “early warning of new threats and tactics” immediately and with minimal effort.