Please turn on your JavaScript for this page to function normally.
Week in review: NSA spying scandal, EU net neutrality, and vulnerable smart TVs

Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: Google won’t allow facial recognition on Glass Whether …

Changes to the standard for PIN Transaction Security

Today the PCI Security Standards Council (PCI SSC) published version 4.0 of the PIN Transaction Security (PTS) Point of Interaction (POI) requirements. These requirements, …

What are users doing after log-in?

Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and …

Backup and recovery problems exposed

A Veeam survey of 500 SMBs across the USA and Europe found that they are experiencing significant issues with the cost, complexity and lack of capabilities of their data …

Secure Windows desktops by removing administrator privileges

BeyondTrust released PowerBroker for Windows 6.0, an identity management solution that allows customers to take a system’s overall risk into context when deciding what …

Microsoft to release five bulletins next week

Microsoft released advance notification for next week’s Microsoft patch and it looks like we’re getting only five bulletins. We received several comments on what …

Rogue employees, malware exploits and unauthorized software

While IT security professionals recognize the threat posed by unwitting employees, many still admit to allowing administrative privileges to go unmanaged, making organizations …

Tripwire includes web application scanning with IP360

Tripwire announced that dynamic web application scanning is now included in IP360. This critical functionality enables customers to detect and prioritize web application …

Microsoft and FBI disrupt global cybercrime ring

Microsoft, the FBI, Agari, financial services industry leaders FS-ISAC, NACHA, and other industry partners, managed to break up a massive cybercrime ring which was stealing …

Most small businesses can’t restore all data after a cyber attack

Almost one-third of U.S. small businesses surveyed by the Ponemon Institute had a cyber attack in the previous year, and nearly three-quarters of those businesses were not …

Is data fragmentation putting businesses at risk?

IT managers believe that fragmentation of corporate data across their IT infrastructure and an emerging “Shadow IT’ network of user devices or consumer cloud …

Cloud security for Windows, Android and iOS

Boxcryptor, the cloud-optimized encryption software, has been updated to version 2.0. The new version includes increased usability as well as features for secure …

Don't miss

Cybersecurity news