Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.
The post Election hacking FAQ: 2016 US presidential election edition appeared first on WeLiveSecurity.
![]()
Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.
The post Election hacking FAQ: 2016 US presidential election edition appeared first on WeLiveSecurity.
![]()
ESET’s Stephen Cobb explains the four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.
The post Snowden: 4 big security and privacy assumptions he undermined appeared first on WeLiveSecurity.
![]()
At VMworld there are a bewildering number of technologies trying to integrate in order to provide your data to entire networks, reports ESET’s Cameron Camp.
The post VMworld: The year of the developer appeared first on WeLiveSecurity.
![]()
All too commonly API security is something of an afterthought, says ESET’s Cameron Camp at this year’s VMworld. This needs to change.
The post VMworld: Can you trust your API? appeared first on WeLiveSecurity.
![]()
VMWorld this year feels like a confessional – operators coming clean about their lack of data visibility, heads hung in shame, says ESET’s Cameron Camp.
The post VMWorld: Do you know where your data is? appeared first on WeLiveSecurity.
![]()
This year at Defcon, the car hacking village is bigger than ever, says Cameron Camp. Key observation? The tools are getting better.
The post Car hacking: Defcon style appeared first on We Live Security.
![]()
In years past at Black Hat here in Las Vegas, there was row after row of hardware, then, in later years, row after row of software – Now there’s row after row of middleware.
The post Black Hat 2016: When middleware takes over the world appeared first on We Live Security.
![]()
Ahead of this year’s Comic-Con in San Diego, ESET’s Aryeh Goretsky has put together a handy travel, security and privacy guide.
The post Comic-Con: Travel, safety and privacy guide appeared first on We Live Security.
![]()
Remember when a 100 gigabyte hard drive was huge? I try not to think about it, but I also remember when no one could figure out what to do with a hard drive “that large”.
The post Interop: Getting a few more years out of your tech appeared first on We Live Security.
![]()
It’s said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those unruly users – Oh, but there is!
The post The Four “A”s of Account Management appeared first on We Live Security.
![]()