Interset Brings Reputation Scoring to the World of Insider Threats
Security analytics company Interset wants to change the way IT pros think about security and bring the concept of reputation-based security scoring to a broader market, with the Interset Behavioral...
View ArticlePCI DSS Moving Security Ahead in 2016
Improved guidance on how organizations can comply with requirement for continuous monitoring and logging is on tap for this new year. The Payment Card Industry Data Security Standard (PCI DSS) is one...
View ArticleGoogle’s First 2016 Android Update Fixes a Dozen Flaws
Google rated five of the 12 vulnerabilities as critical. Once again, flaws emerged in Android's much-maligned mediaserver. Google came out with its first Android security patch of 2016, and it's...
View ArticleHackers cause Ukrainian power cut – a reminder cyber attacks will become more...
Ukrainian power outage 'sparked' by email-borne malware makes Ashley Madison hack seem trivial
View ArticleWhat Key Data Breach Trends Portend for Enterprise Security in 2016
As we return to our routines at the outset of the new year, it's a good time to reflect on the past year in enterprise security, to see if we've learned anything and to take a look at what lies ahead....
View ArticleIT Security in 2016: Look Back, Not Forward
NEWS ANALYSIS: IT security in 2016 shouldn't be about trying to figure out what's coming next, but about dealing with issues that exist now. At the beginning of every new year, vendors and tech pundits...
View ArticleBrazilian Cyber-crime Flourishes, Catching Up to Russian, Chinese Groups
Studies of cyber-crime in Russia, China, Brazil and other nations find that each has its strengths. Computer education in public schools, lightly enforced computer crime laws, and a deep divide between...
View ArticleMicrosoft is ending support for Internet Explorer 8, 9 and 10 next week
You have until Tuesday to get on 11 or Edge
View ArticleUltra Payment’s PayGate Payment solutions now conform to the latest Bacs...
Available to customers at no extra cost ahead of the 1 June deadline.From 1 June 2016, Bacs withdrawal of support for older connection protocols, together with changes to internet security, could...
View ArticleLinode Resets Passwords as DDoS Attacks Continue
The cloud hosting provider forces users to change passwords after an unauthorized log-in is detected. Linode is having a rough start to 2016. The cloud hosting provider has been suffering from a series...
View ArticleMass surveillance and bulk data collection won’t prevent terrorism, warns...
Binney tells Joint Committee of MPs and Lords that targeted surveillance, not bulk collection, could've prevented 9/11
View ArticleExploiting Silent Circle’s Secure Blackphone
The highly secure device could have been exploited, were it not for the responsible disclosure by a security researcher. Any modern device is made up of multiple hardware and software components, any...
View ArticleCisco Security Researchers Disrupt RIG Exploit Kit
The popular exploit kit, which enables attackers with packaged vulnerabilities to infect users, is still out there, but new efforts are helping curb its growth. The RIG exploit kit is under attack,...
View ArticleSoftware Security Startup SourceClear Names New President
SourceClear, a developer code security vendor, is ramping up for 2016 with some new efforts and a new president. Jim Morrisroe, newly named president of software security startup SourceClear, worked at...
View ArticleKeep Hillary Clinton in Mind When Enforcing Email Security Policies
NEWS ANALYSIS: Regardless of your politics, there are plenty of reasons to think of Hillary Clinton and U.S. Secretary of Defense Ashton Carter as poster children for bad email security. Here it is...
View ArticleDatum showcases its business critical data centre service to the Public Sector
FARNBOROUGH – 11 January 2016 – On Tuesday 12 January, the 2016 Government ICT conference will take place within the QEII Centre in the heart of Westminster. This long standing event brings together...
View ArticlePlanview Top Rated for its Cloud Security by Skyhigh’s CloudTrust™ Program
Reading, UK, – Jan. 11, 2016 – Planview® has been awarded the Skyhigh CloudTrust™ rating of enterprise-ready for Planview Enterprise, its solution for portfolio and resource management. Skyhigh...
View ArticleDatacloud 2016 Highlights Cloud Connectivity, Fiber Networks, Data Center as...
London/Monaco, 11 January 2016 – Datacloud Europe 2016 (http://www.datacloudcongress.com/) which meets this June 7-9 in Monaco, will feature the critical eco system of cloud connectivity, fiber...
View ArticleAppSense Receives “Nutanix Ready” Validation to Simplify Virtual Desktop...
Together, AppSense and Nutanix Speed VDI Implementations with the Ease of Configuration and Flexibility that Delivers Rapid “Time to Solution” BenefitsSunnyvale, Calif., January 11, 2016 – AppSense,...
View ArticleJuniper Networks Moves to Replace Vulnerable Code
After a backdoor is found on its ScreenOS, Juniper Networks takes steps to replace potentially compromised cryptography components. At the end of 2015, Juniper Networks publicly disclosed that it had...
View Article