There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to security risks. Where should security fit in?
“Leaking Beeps” is a series of studies by Trend Micro that aims to highlight a weakness in pager technology and how it can put critical activities of affected companies at risk.
The third part of the “Leaking Beeps” series discusses the different types of IT systems connected with unencrypted pages that can be used by attackers for reconnaissance or intelligence gathering.
With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from tens of kilometers away. Who still uses pagers in this day and age? Healthcare facilities. Goodbye, PHI.
An enterprise guide on network segmentation; how it works to secure large enterprise networks, why it's needed, and examples of some of the most widely used network models for different industries.
This primer discusses the importance of data classification, and how organizations can implement these strategies to reduce the effects should a data breach occur.
In 2015, the European Union will implement a new EU Data Protection Regulation for everyone who does business in any of the Union's 28 member states. Here's what you need to know to make sure your organization is ready before implementation.