Please turn on your JavaScript for this page to function normally.
ISO 27001/BS 25999-2: The certification process

Obtaining an ISO 27001 or BS 25999-2 certificate is not mandatory, however most of the companies implementing either of these standards want to get certified – the main …

BYOT: Bring Your Own Token

SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization. At the click …

MCTS 70-680 Rapid Review: Configuring Windows 7

Assess your readiness for MCTS Exam 70-680—and quickly identify where you need to focus and practice. This practical guide walks you through each exam objective, providing …

Most parents secretly access teens’ Facebook accounts

For generations, parents have been suspicious of teens’ social activities – and have employed any number of tactics to uncover the truth. Today’s parents are …

New York top city for online fraud activity

New York is the nation’s epicenter for online fraudsters, followed by Atlanta, Chicago, Los Angeles, and Omaha respectively. Leveraging a sample of nearly a billion …

New firewall safeguards against medical-device hacking

Researchers at Purdue and Princeton universities have created a prototype firewall to block hackers from interfering with wireless medical devices such as pacemakers, …

Mobile phones expose businesses to massive risks

Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks. These are the …

Portable encrypted Linux computing environment

SPYRUS announced a new version of Secure Pocket Drive that allows end users to build and distribute their own secure bootable Linux OS image. In addition to offering secure …

Oracle fixes 88 security vulnerabilities

Oracle’s Critical Patch Update for April 2012 fixes 88 security vulnerabilities across the product line. The amount of fixes isn’t really a big concern; it’s …

Tenable enhances Nessus Perimeter Service

Tenable Network Security announced the newest version of its Nessus Perimeter Service which extends the power of its vulnerability scanner to help businesses protect payment …

Switching to the Mac: The Missing Manual, Lion Edition

There’s never been a better time to switch to Mac OS X and David Pogue’s newly released Switching to the Mac: The Missing Manual, Lion Edition can help you do it. …

Use iPads and iPhones securely on the job

MokaFive, whose software is driving the use and acceptance of Macs in the enterprise, is now doing the same for the iPad and iPhone. The new MokaFive for iOS unites work and …

Don't miss

Cybersecurity news