Archive

Back to homepage
Mobile

Android Malware doubled in 2015 vs 2014; Trend Micro 2015 Threat ReportDATAQUEST

The Android security is becoming a serious concern as the Android Malware was reported to by double in 2015 as compared to 2014. Trend Micro Incorporated released its annual security

Hardware/Network

Hacker reveals $40 attack to steal Police drones from 2km away

Black Hat Asia IBM security guy Nils Rodday says thieves can hijack expensive professional drones used widely across the law enforcement, emergency, and private sectors thanks to absent encryption in on-board

BYOD/Big Data

5 enterprise mobility and BYOD reports you need to read from HP, Dell, CA Technologies and others

With the enterprise mobility industry in a state of constant evolution in terms of both technology and practices, the intentions and priorities of stakeholders change regularly. Read the source article

Software

Malvertising Thrives in ‘Shady’ Parts of Highly-Automated Ad Networks

Attacks on highly-automated ad networks serving major Websites demonstrate that attackers are finding ways to exploit the poorly-defended online ad market. For two days in mid-March, visitors to major news

BYOD/Big Data

Cybersecurity remains biggest barrier to BYOD adoption – SecurityBrief NZ

Crowd Research Partners’ new 2016 BYOD and Mobile Security Report, conducted with various data security vendors including Check Point Software and Tenable Network Security , and was based on a

Identity Theft

Dispelling the Dangerous Myth of Data Breach Fatigue

In the past year, we saw a record number of data breaches – 781 in total that left 169,068,506 people exposed, according to a recent report by the Identity Theft

Software

7 Steps to Better Data Security

Cybersecurity is a topic so broad that the NIST Framework addresses the concept of “Data Security” as just one of 22 important risk categories. Found within the “Protect” function of

Vendor News

Coalfire Expands Cyber Risk Advisory Services

Coalfire announced the expansion of its Cyber Risk Advisory services that are designed to assist enterprises as they guard against data breaches and improve their governance programs. Coalfire’s Cyber Risk

BYOD/Big Data

Bring Your Own Risk with BYOD

In the age of the anywhere, anytime workplace, establishing boundaries for BYOD programs gets complicated. As workforces become increasingly mobile and available through the use of smartphones, tablets and laptops,

Industry Insights

Cyber Liability Insurance: Moving from Insurance to Assurance

Enterprises need to identify holes and implement proper plugs prior to investing in cyber liability insurance. It’s no shock to any following the news over the past several years that