Meltdown and Spectre exploits: Cutting through the FUD
A breakdown of what the Meltdown and Spectre exploits are, what they aren’t, the risks they pose, and what you should do.
A breakdown of what the Meltdown and Spectre exploits are, what they aren’t, the risks they pose, and what you should do.
Consumers will lead the charge to the Internet of Things, but enterprise adaptation will not be far behind. Will your IT department be ready?
Is anything secure anymore? The National Security Agency (NSA) leaks have produced a number of side effects. What we assumed was a safe form of communications is perhaps not so secure after all. The gold standard of secure mobile messaging, BlackBerry, may have been compromised.
Expect enterprises to start instituting stricter policies to make BYOD a more secure and cost-effective policy.