Please turn on your JavaScript for this page to function normally.
BYOD is an applications strategy, not just a purchasing policy

Bring your own device (BYOD) is not just a purchasing policy and needs to be approached more broadly with the applications and strategies designed for today’s world, …

Overcoming the data privacy obstacle to cloud based test and development

How many times have data security and privacy constraints brought your key application development initiatives to a screeching halt? It usually occurs right around the time …

Cyber Monday security tips for businesses

Security experts at Neohapsis have put together the following tips to help keep businesses safe. 1. Use HTTPS – Remind employees to use HTTPS to make sure all data …

Documentary: Buying guns and drugs on the deep web

Motherboard used the deep web to find out just how easy it was to buy guns, drugs, and other contraband online. VICE Germany editor Tom Littlewood talks with cryptology …

Innovations that will shape network security

Headline after headline, some company reports a cyber incident and hangs its head in shame. While it is disappointing, strong businesses have strong leaders that show us how …

Week in review: vBulletin.com hack, new perspective on Stuxnet, and ongoing large-scale MitM attacks

Here’s an overview of some of last week’s most interesting news, reviews and articles: Netflix users in danger of unknowingly picking up malware Users of …

Top 10 data disasters from 2013

Kroll Ontrack announced its 11th annual list of the top 10 data disasters from 2013. For the last 11 years, the company has annually been collecting and publishing a list of …

New threats subverting digital signature validation

McAfee Labs found new efforts to circumvent digital signature app validation on Android-based devices. The McAfee Labs team identified a new family of mobile malware that …

The risks of having a false sense of security

Organizations are overwhelmingly confident in their readiness to combat security threats, but may not be prepared for dangers linked to new technology models and increasingly …

NTRU public key crypto released to open source community

RSA and ECC are the two most common public-key crypto systems in use today. At the 2013 Black Hat conference, researchers declared that the math for cracking encryption …

Only half of healthcare IT pros use formal risk assessments

Tripwire and the Ponemon Institute evaluated the attitudes of 1,320 respondents from IT security, IT operations, IT risk management, business operations, compliance/internal …

Are tablets secure enough for business?

Amazon is launching its first enterprise-ready tablet. A smart move, as the much-loved mobile device can finally be integrated into business. However it does beg the question, …

Don't miss

Cybersecurity news