Back to homepage
Industry Insights

Security Experts To White House: Treat Cyber Threat As Serious Business

In light of increasingly apparent, potentially catastrophic online threats to national security, experts from around the country and globe are emphasizing the government’s need to act, and invest, accordingly. Click

IT Compliance

Payment Card Industry Security Compliance: What You Need to Know

In the dynamic world of payments, transaction security is of paramount importance. When we speak with our customers and partners, the topic of payment security and Payment Card Industry (PCI)

BYOD/Big Data

BYOD is dead. Long live BYOD – ITProPortal

BYOD is dying. It’s not that people no longer bring devices to work. It’s that everyone brings their devices to work. Whether you use BYOx (bring your own everything) to


Windows zero-day affects 600,000 older servers, but likely won’t be patched – ZDNet

A previously-undisclosed security flaw in an older Windows web server won’t be patched, despite hundreds of thousands of servers still running the outdated software. Click here to view original webpage


Cloud Complexity Leads to Chaotic Security Environments – Infosecurity Magazine

About one-third of respondents in a survey of RSA attendees describe the state of security monitoring within their organization as “complex and chaotic,” thanks to a lack of visibility into

BYOD/Big Data

CYOD or BYOD: A growing cybersecurity choice – CSO Online

Time to dump BYOD in favor of CYOD? As malicious hackers step up their attacks against mobile platforms, enterprises may want to re-examine whether there’s a better way to protect the security of their mobile


Flatbed Scanners Used as Relay Point for Controlling Malware in Air-Gapped Systems

Scientists from two Israeli universities have come up with a way to use flatbed scanners as relay points when sending commands to malware installed on an air-gapped computer. Further research


Open-source developers targeted in sophisticated malware attack – TechWorld

For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware. Click here to


Android Virus 101: Best & Simple Ways to Detect and Remove Malware

Android virus detection and removal should be not be neglected by every smartphone users having such mobile operating system. With the persistence of Trojan viruses and other malware, these basic

Identity Theft

Data Breach Acceptance Replacing Breach Prevention?

The number of records lost, stolen or compromised in data breaches jumped 86% between 2015 and 2016 even though the number of breaches worldwide dropped 4% in the same period,