Why U.S. Government HTTPS-Only Mandate for Federal Sites Is Key
The U.S. government is taking a major step to secure its online assets with a new directive from the White House Office of Management and Budget (OMB) to run HTTPS-Only across all federal Websites. The...
View ArticleEmails From Your Trusted Suppliers Can Be Very Bad For Business!
By David Parkinson, Strategic Development Manager, UK and Ireland for Wick Hill Woking, Surrey: 10th June 2015 - The term 'Trusted Supplier' says it all. It's a supplier that we have used before,...
View ArticlexMatters Announces Updated Intelligent Communications Solution for Managing...
New Technology Addresses Complexity of Dispersed Global Teams and Infrastructures London, UK. - June 10, 2015 - xMatters, inc., a leader in communication-enabled business processes, today introduced...
View ArticleSyrian Electronic Army Took Aim at U.S. Army Website
The Syrian Electronic Army (SEA), a digital hacking group loosely aligned with the government of Syrian President Bashar al-Assad, is claiming responsibility for an attack against the Army.mil Website...
View ArticleKaspersky Lab’s Own Network Hit by Cyber-Attack
Eugene Kaspersky, founder of Kaspersky Lab, reveals that the Duqu 2.0 nation-state-developed advanced persistent threat was in his company's network for months. Euguene Kaspersky, founder of Kaspersky...
View ArticleCompanies Not Confident They Can Secure Data, Foil Attacks
A new survey finds information-security capabilities are still not well developed and suggests that more mature teams may be less confident. Corporate information-security executives and managers lack...
View ArticleAdobe Flash Vulnerabilities, Ransomware on the Rise
In the world of online security, change is a constant as the exploit and malware landscape is continuously evolving, with attackers adapting to evade detection and defenses. Intel Security's McAfee...
View ArticleExploit Kits Deliver Big Returns for Hackers
The Trustwave 2015 Global Security Report details the financial success attackers are achieving via exploit kits and how to avoid them. There are a lot of different ways that hackers can attack users...
View ArticleFrench Regulators: Google Must Apply ‘Right to Be Forgotten’ Globally
Google’s obligations under the European Union’s "right to be forgotten" mandate apply worldwide, France’s CNIL says. France's main data protection authority, CNIL (Commission Nationale de...
View ArticleRapid7’s IPO Filing Underscores Demand for Security Services
NEWS ANALYSIS: Money continues to flow toward companies like Rapid7, which focuses on penetration testing and recently announced new incident-response services. Security vendor Rapid7's June 11 S-1...
View ArticleOne in four consumers would share their DNA with their bank to secure...
MONDAY 15 JUNE 2015, LONDON: A new report [1] from Telstra reveals the majority of consumers using mobile banking applications want their mobile devices to instantly recognise them via biometrics, such...
View ArticleWhat General Catalyst VC Steve Herrod Is Investing In
VIDEO: Steve Herrod, managing partner at General Catalyst, discusses how his venture capital firm invests in security and where it's placing its big bets. There is no shortage of venture capital funds...
View ArticleOPM Data Breach News Just Keep Getting Worse
NEWS ANALYSIS: The Office of Personnel Management may have suffered more breaches and lost more information than it previously acknowledged. The news about the data breach at the U.S. Office of...
View ArticleRiskIQ uncovers ‘app attack’ threat to high street brands
Consumers at risk from malicious mobile apps UK brands don't know aboutLONDON, UK, June 16, 2015 - New research from RiskIQ, the Digital Footprint Security company, highlights the risks posed to UK...
View ArticleHarbrick, Producer of Autonomous Vehicle Software Systems, Selects FlexNet...
Flexera Software solution is critical to enable secure, flexible and reliable licensing, entitlement management and automated updates of Harbrick's Polysync software Maidenhead, U.K. - June 16, 2015....
View ArticleGoogle Launches Bug Bounty for Android Running on Nexus Phones
Google announces it will pay for information on software flaws in the Android operating system, and more detailed reports will earn higher rewards. Google will pay thousands of dollars to researchers...
View ArticleWatchful Software Adds Cisco Executive Greg Akers to Board of Directors
Industry luminary brings depth in technology and market expertise to growing industry leader for data-centric securityMedford, NJ, June 16, 2015 - Watchful Software, a leading provider of data-centric...
View ArticleTrustwave Weighs In on Self-Detected, SSL/TLS Vulnerabilities
Security specialist Trustwave's in its latest report provides insights from 574 security incidents the company investigated. Surprisingly, 98 percent of the applications the security specialist scanned...
View ArticlePassword Management Service LastPass Gets Hacked
After the data breach of LastPass (which claims no user data was stolen), security experts discuss the merits and the risks of using password managers. Password security vendor LastPass publicly...
View ArticleMicrosoft’s Azure AD Sniffs Out Leaked User IDs and Passwords
Microsoft's Azure Active Directory Premium now alerts administrators when their users' passwords are being circulated around the dark corners of the Internet. Microsoft's Azure Active Directory (AD)...
View Article