The government of Sudan started seizing and quarantining laptop computers for inspection last week, ostensibly to stem the import of pornography and seditious material. Official assurances that the inspection of each laptop will take no more than 24 hours have done little to assuage fears of foreign visitors. Many are understandably reluctant to hand over collections of business and personal information for Sudanese officials to pore over in search of hostile or titillating tidbits.
- The Future is Encrypted. Manage It.
- See Your Traffic for What It Really Is
- Test Your Knowledge of Network Encryption
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- Join Skeeve Stevens, Stanley Shanapinda, and more on how to manage metadata to maximise your ability to detect and prevent an attack. Register
- Ransomware explosion is the latest security wakeup call for CxOs
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Caution: That SSL Blind Spot is Growing
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security
- New Destination Gigamon Security Resources IS HERE
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- CLOUDSEC2016 - Timothy Wallach, Cyber Taskforce FBI (USA) speaks on the status & evolution of global cybercrime. Save your seat