Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.
The post Election hacking FAQ: 2016 US presidential election edition appeared first on WeLiveSecurity.
Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.
The post Election hacking FAQ: 2016 US presidential election edition appeared first on WeLiveSecurity.
ESET’s Stephen Cobb explains the four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.
The post Snowden: 4 big security and privacy assumptions he undermined appeared first on WeLiveSecurity.
At VMworld there are a bewildering number of technologies trying to integrate in order to provide your data to entire networks, reports ESET’s Cameron Camp.
The post VMworld: The year of the developer appeared first on WeLiveSecurity.
All too commonly API security is something of an afterthought, says ESET’s Cameron Camp at this year’s VMworld. This needs to change.
The post VMworld: Can you trust your API? appeared first on WeLiveSecurity.
VMWorld this year feels like a confessional – operators coming clean about their lack of data visibility, heads hung in shame, says ESET’s Cameron Camp.
The post VMWorld: Do you know where your data is? appeared first on WeLiveSecurity.
This year at Defcon, the car hacking village is bigger than ever, says Cameron Camp. Key observation? The tools are getting better.
The post Car hacking: Defcon style appeared first on We Live Security.
In years past at Black Hat here in Las Vegas, there was row after row of hardware, then, in later years, row after row of software – Now there’s row after row of middleware.
The post Black Hat 2016: When middleware takes over the world appeared first on We Live Security.
Ahead of this year’s Comic-Con in San Diego, ESET’s Aryeh Goretsky has put together a handy travel, security and privacy guide.
The post Comic-Con: Travel, safety and privacy guide appeared first on We Live Security.
Remember when a 100 gigabyte hard drive was huge? I try not to think about it, but I also remember when no one could figure out what to do with a hard drive “that large”.
The post Interop: Getting a few more years out of your tech appeared first on We Live Security.
It’s said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those unruly users – Oh, but there is!
The post The Four “A”s of Account Management appeared first on We Live Security.