Six steps for responding to a disruptive attack
Disruptive attacks have become a disturbing trend that IT security departments must consider when analyzing the ongoing threat landscape. This DarkReading article includes six slides that were developed following interviews with Günter Ollmann, chief security officer at Vectra Networks, and Jurgen Kutscher, senior vice president at FireEye.
Facebook confirms bug grants access to iPhone users' cameras
Is the cloud safe? – Reducing business risk as enterprises aggressively move to the public cloud
Financial-services firms face "constructively tough" crackdown after breaches from "basic cyber hygiene" deficiencies: APRA