Archive

Back to homepage
Industry Insights

Cyber-Security Is a Top Priority in Corporate Boardrooms

Security vendor Veracode and NYSE (New York Stock Exchange) Governance Services released a study today that examines the role of cyber-security in the boardroom. Over the course of the last

Software

If we want strong encryption, we'll have to fight for it

As digital rights lawyer and special counsel to the Electronic Frontier Foundation Marcia Hofmann correctly noted in her keynote at Hack in the Box Amsterdam 2015 on Thursday, this issue

Hardware/Network

Researchers Find Over 50 Security Flaws in D-Link Nas, Nvr Devices

The list of security holes includes information leakage, authentication flaws, CGI vulnerabilities, input validation problems, and webpage issues. Some of the weaknesses can be exploited by remote attackers to execute

Vendor News

Google launches native Android Smart Lock password manager

Google I/O Android users will be able to store passwords in Google’s native Smart Lock manager, in a security boon for the masses. The Choc Factory launched the Smart Lock

Software

Why You Need A Risk Policy For Open Source – Lifehacker Australia

You may well be readi Young this article at your desk at work or, perhaps, at home. You may be reading it on a browser based on open source. Your

Software

Improving Enterprise Email Security: Systems and Tips

You simply cannot rely on outdated e-mail security technology any longer. Threats are growing increasingly sophisticated, targeted dynamic, and attackers are looking to exploit any vulnerability – including zero-day vulnerabilities

BYOD/Big Data

IBM Security Intelligence with Big Data

With major security breaches and fraud incidents making international headlines, organizations are taking steps to address the growing problems of advanced persistent threats, fraud, and insider attacks. Read the source

Hardware/Network

How does machine design affect data security on a network? – Control Design

Machine builders take the first step in providing equipment data to users. Without a machine, there’s no data to share. When the controls network is designed, machine builders now account

Cloud

Cloud security summit comes to Norway – ComputerWeekly.com

IT directors and security professionals from across the Nordics will gather in Oslo on 15 June for the first Nordic Summit from the Cloud Security Alliance (CSA). Keynote speakers include

Industry Insights

PCI: 5 New Security Requirements

Five best practices noted in version 3.0 of the PCI Data Security Standard will become requirements after June 30, and smaller merchants are likely to be the most affected, says