analysis
Filter by...
-
The post truth of “threat intelligence”
In the context of identifying the root cause of security breaches or attacks, we often see the threats emerging from weapons such as botnets, viruses, malware, etc. However, the biggest network security threats can also reside within a company. For this reason, modern techniques of network security forensics – the process of identifying the root […]
Read more
-
TiSA leaks set alarm bells ringing
Read this in German. Despite the rumours and assertions by several Member States that Transatlantic Trade and Investment Partnership (TTIP) is dead, the fight for safeguarding citizens’ rights and freedoms via so-called “trade agreements” is far from over. Now it is time to address the threat from the Trade in Services Agreement (TiSA). Just days […]
Read more