
Creating a professional development plan in information security
Working in cyber security is a viable career option for anyone who wants to give…

Creating a culture of security to defend against social engineering attacks
The Fifth Annual Benchmark study on Privacy and Security of Healthcare Data by Ponemon Institute…

Case Studies | Communication | Cyber Security | Information | Reports | Security | Technology | July 20, 2016
Converge Information Technology (IT) and Operational Technology (OT)
ISACA and the International Society of Automation Issue Call to Action The convergence of information…

Fake lockscreen app on Google Play: Pokemon GO Ultimate
ESET researchers have discovered fake apps on Google Play targeting Pokémon GO’s hungry hordes. Among…