How Cyber-Attacks Continue to Evolve, Despite Upgraded Security
With the growing list of companies, people and even nations suffering the loss of private, confidential and valuable information, it's plain that cyber-attacks continue to evolve in nature and...
View ArticleOrganizations Feel More Secure Than Three Years Ago: Intel Study
Despite cyber-threats, many organizations have seen an improvement in security in recent years, a new study sponsored by Intel Security and Aspen Institute finds. Day in and day out, the headlines...
View ArticleWhat We Should Learn from July 8, the Great Glitch Day
NEWS ANALYSIS: We are treating the symptoms of a security illness rather than trying to determine the underlying causes, security expert tells eWEEK. We get pelted every day with so many news stories...
View ArticleDatum reaffirms its commitment to information security with accreditation to...
FARNBOROUGH - 22 July 2015 - Datum Datacentres, the Farnborough based provider of ultra secure, high resilience co-location data centres, today announced that it has achieved ISO 27001 transition to...
View ArticleSecuring Health Care Records: Jury Is Out on Industry Competence
Confidence in Cloud Computing Security Still Not Good While the use of cloud computing has grown in many industries, when it comes to health care, only 64 percent of respondents s...
View ArticleMicrosoft Advanced Threat Analytics to Ship in August
On-premise Active Directory customers will soon be able to thwart data breaches and other data security mishaps due to stolen user credentials. Microsoft Advanced Threat Analytics, currently in beta,...
View ArticleFBI Brings Charges Against Five With Possible Links to JPMorgan Hack
The long arm of U.S. justice prevails as individuals in Florida and Israel are apprehended and charged with crimes involving Bitcoin exchanges and stock manipulation. While attacks against...
View ArticleResearchers Look to Bots, Big Data to Fix Software Flaws
MIT researchers create a system, dubbed Code Phage, to fix security software bugs by borrowing code from other programs, while other companies are using Big Data analytics to hunt down code flaws....
View ArticleResearchers to Show How Hackers Might Access Cars Remotely
NEWS ANALYSIS: Research slated for release at the upcoming Black Hat USA conference examines how vulnerable vehicles are to remote attacks. Security researchers Charlie Miller and Chris Valasek have...
View ArticleHow Attivo Networks is Raising the Bar on Honeynet Security
CEO: "Essentially we have a full platter of cheese with all the different varieties; then we watch and see if somebody comes and bites it." If ever there was a need for new ideas in IT security, the...
View Article1st Touch Appoints Greg Johns As CEO As Robert Dent Leaves To Explore New...
1st Touch (www.1sttouch.com), the UK's leading developer of mobile systems for the social housing sector, has appointed Greg Johns as CEO. Johns, who previously headed the company's sales operation...
View ArticleMarch Networks Adds New, Time-Saving Capabilities and Redesigned Interface to...
Free mobile app helps integrators work more efficiently and reduce service costsOTTAWA, ONTARIO, July 23, 2015 -- March Networks®, a global provider of intelligent IP video solutions, is pleased to...
View ArticleSmartwatches Are Not All That Smart When It Comes to Security
A new HP report finds that smartwatches have the same security issues as other Internet of things devices. Hewlett-Packard is on a mission to raise awareness about insecure configurations and practices...
View ArticleDDoS Attacks Overwhelm Targets With Ever Rising Data Floods
Distributed denial-of-service (DDoS) attacks are among the most impactful types of Internet security threats today, flooding organizations with traffic in an effort to restrict or disable service for...
View ArticleAll smartwatches are vulnerable to cyber attacks, HP study finds
HP believes test of 10 smartwatches is a good indicator of current security posture of all smartwatch devices
View ArticleStartup ProtectWise Deploys ‘Time Machine’ Security Approach
ProtectWise can go back in time, check to see the events leading up to a data breach or other business issue, and issue a real-time report. Picture an IT system, then imagine a DVR unit recording...
View ArticleFiat Chrysler Recalling 1.4 Million Autos Over Remote Hacking Fears
After fears are raised about remote hacking that could enable attackers to take control of vehicles, Chrysler announces the recall of 1.4 million cars and trucks. Fiat Chrysler Automobiles is recalling...
View ArticleHYPR Debuts Biometrics SDK to Improve Authentication
The FIDO standard-compliant implementation could enable broader use of biometric devices for strong authentication. When it comes to gaining secure access to online sites and services, the use of...
View ArticleEnd Users Not the Enemy When It Comes to Security
[unable to retrieve full-text content]A group of customers, analysts and journalists at a Dell roundtable say the responsibility for driving data security ultimately falls on the vendors.
View ArticleFiat Chrysler Auto Recall Highlights Rising Fears About IoT Hacking
NEWS ANALYSIS: The recall of 1.4 million Fiat Chrysler vehicles to update software to prevent a difficult-to-execute hack of onboard control systems highlights the rising fears about Internet of...
View Article