Microsoft is opening up about some of its testing procedures, too.
We demonstrate how a relatively unskilled attacker could gain access to data from more than 11,000 files in unsecured IaaS cloud environments.
Read More →
Cloud-based online services are useful tools for many enterprises, allowing them to coordinate their teams, share information and enable discussions within groups. However, companies should be shar
Competent healthcare providers are great at medical things.
Securing electronic devices or health records? Not so much, the Ponemon Institute finds.