Engineering Procurement Construction Management (EPCM)

September 26, 2016

Symantec 2016 Internet Security Threat Report

Symantec 2016 Internet Security Threat Report The 2016 Internet Security Threat Report (ISTR) provides an overview and analysis of the year in global threat activity. A […]
September 19, 2016
MGS+

Verizon’s 2016 Data Breach Investigations Report finds cybercriminals are exploiting human nature

Verizon’s 2016 Data Breach Investigations Report finds cybercriminals are exploiting human nature Cybercriminals are continuing to exploit human nature as they rely on familiar attack patterns […]
September 12, 2016

McAfee Labs 2016 Threats Predictions Report Forecasts Changes

McAfee Labs 2016 Threats Predictions Report Forecasts Changes The report illustrates an ever-evolving threat landscape, in which applications and prominent operating systems are hardened to attacks, […]
August 8, 2016

Google Security – Android Security 2015 Annual Report

Google Security – Android Security 2015 Annual Report Enhancing Google’s services to protect Android users In the last year, Google significantly improved machine learning and event […]
August 1, 2016

ICIT Brief: Know Your Enemies – A Primer on Advanced Persistent Threat Groups

ICIT Brief: Know Your Enemies – A Primer on Advanced Persistent Threat Groups Every system connected to the internet in every home, organization, and government entity […]
July 25, 2016

Dell Annual Threat Report Reveals Cyber Criminals Using Aggressive, Shape-Shifting Threat Tactics; 50% Surge in Encrypted Traffic Affected Millions of Users in 2015

Dell Annual Threat Report Reveals Cyber Criminals Using Aggressive, Shape-Shifting Threat Tactics; 50% Surge in Encrypted Traffic Affected Millions of Users in 2015 – Exploit kits […]