Verizon to buy Yahoo for $4.48 billion
"There's an assumption that if breached organizations are sufficiently instrumented, they can detect breaches, track attackers' activities and enumerate precisely what data they had access to," says Vectra CSO Günter Ollmann. Unfortunately, most organizations aren't sophisticated enough to identify this level of threat activity.
Facebook confirms bug grants access to iPhone users' cameras
Is the cloud safe? – Reducing business risk as enterprises aggressively move to the public cloud
Financial-services firms face "constructively tough" crackdown after breaches from "basic cyber hygiene" deficiencies: APRA