Posted on 10 February 2012 by Tim Cawsey
Today, dear reader, our blog is one year old. That’s right – our very first post was 365 days ago on 10th February 2011. We feel we have grown with the blog, expanding our hub to include a telecoms blog and one focused on enterprise security covering a multitude of topics and industries. While ‘Digital […]
Posted on 23 October 2012 by Thales
We had a great reaction from our followers on our research into the issues that are keeping CIOs awake at night. Here on the blog we discussed the findings across the United Kingdom, France, Germany, the USA and the Nordics. Let’s take a look the UK findings in more detail. If you’ve seen or shared […]
Posted on 31 May 2011 by Thales
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.