BYOR : Dark side of the cloud (Part 2)
In my last post, I presented the different terms and taxonomy related to information security investment and cost optimizing strategy. As a logical way, the BYOR series is continuing with this [...]
In my last post, I presented the different terms and taxonomy related to information security investment and cost optimizing strategy. As a logical way, the BYOR series is continuing with this [...]
Studying the global trends of information security, throughout the last decade, shows a continuous raise of cyberattack’s frequency, severity and impacts. In 2015, the number of detected [...]
OKIOK is pleased to have presented “Application Security and Phishing” at the OWASP conference initiative sponsored by OWASP Montreal. OKIOK exposed the impacts of phishing experienced by [...]