Back to homepage
Industry Insights

Cyber-Security Is a Top Priority in Corporate Boardrooms

Security vendor Veracode and NYSE (New York Stock Exchange) Governance Services released a study today that examines the role of cyber-security in the boardroom. Over the course of the last


If we want strong encryption, we'll have to fight for it

As digital rights lawyer and special counsel to the Electronic Frontier Foundation Marcia Hofmann correctly noted in her keynote at Hack in the Box Amsterdam 2015 on Thursday, this issue


Researchers Find Over 50 Security Flaws in D-Link Nas, Nvr Devices

The list of security holes includes information leakage, authentication flaws, CGI vulnerabilities, input validation problems, and webpage issues. Some of the weaknesses can be exploited by remote attackers to execute

Vendor News

Google launches native Android Smart Lock password manager

Google I/O Android users will be able to store passwords in Google’s native Smart Lock manager, in a security boon for the masses. The Choc Factory launched the Smart Lock


Why You Need A Risk Policy For Open Source – Lifehacker Australia

You may well be readi Young this article at your desk at work or, perhaps, at home. You may be reading it on a browser based on open source. Your


Improving Enterprise Email Security: Systems and Tips

You simply cannot rely on outdated e-mail security technology any longer. Threats are growing increasingly sophisticated, targeted dynamic, and attackers are looking to exploit any vulnerability – including zero-day vulnerabilities

BYOD/Big Data

IBM Security Intelligence with Big Data

With major security breaches and fraud incidents making international headlines, organizations are taking steps to address the growing problems of advanced persistent threats, fraud, and insider attacks. Read the source


How does machine design affect data security on a network? – Control Design

Machine builders take the first step in providing equipment data to users. Without a machine, there’s no data to share. When the controls network is designed, machine builders now account


Cloud security summit comes to Norway –

IT directors and security professionals from across the Nordics will gather in Oslo on 15 June for the first Nordic Summit from the Cloud Security Alliance (CSA). Keynote speakers include

Industry Insights

PCI: 5 New Security Requirements

Five best practices noted in version 3.0 of the PCI Data Security Standard will become requirements after June 30, and smaller merchants are likely to be the most affected, says