There is a lot of talk in certain circles at the moment about key management in distributed on-demand computing environments (aka ‘the… Read More
RSA have finally broken their silence over the extent of the SecurID breach and the implications are not good.
When I last wrote… Read More
Another day, another cyber security headline. This time it’s the… Read More
This is how RSA Security described the infiltration that lead to the now-famous attack which “reduce[d] the effective security of [… Read More
It’s that time of year again when everyone and anyone from the security community converges in San Francisco for RSA 2011. Looking at… Read More
Information security and compliance often swim together in the collective minds of CIOs, and so in the mainstream the adoption of… Read More