- Can you afford to wait for hackers to find flaws in your security defences?
- Anthony Haywood, CTO, Idappcom
- InfoSecurity
- Posted On
This week we bring to you a media alert by Amit Klein, Trusteer's CTO new research which shows that 50 per cent of phishing victims’ credentials are harvested by cyber criminals within the “Golden” hour of phishing emails being received.
The Wikileaks saga of the last few days, which climaxed with the release of the first batch of more than 250,000 secret and confidential diplomatic cables sent by US embassies around the world published last night, are a classic example of what can happen when the evolving insider security threat is ignored says Imperva.
To expose official corruption in Nigeria, re-orientate the psyche of Nigerians and usher in the Nigerian renaissance
Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.
Vigilance is the brain child of a group of veteran journalists and international scholars who have worked in the mainstream media and distinguished themselves nationally and internationally before veering into security practice.
We have 615 guests and no members online