Please turn on your JavaScript for this page to function normally.
Business ideas
Top 10 strategic technologies for government in 2016

After nearly a decade of “doing more with less,” government CIOs remain under pressure to further optimize IT and business costs while leading digital innovation …

hard drive
Most used drives sold on eBay hold personal information

Ecommerce sites are reselling used electronics without permanently erasing data from them. Based on an analysis of 200 second-hand hard disk drives and solid state drives …

The Network Ops DDoS Playbook
The Network Ops DDoS Playbook

With the prevalence of DDoS attacks, good preparation and planning can go a long way toward making the DDoS response process as manageable, painless, and inexpensive as …

danger
Businesses are unprepared for emerging threats

Organizations are failing to appreciate the growing challenges of protecting their data and, as a result, are experiencing the economic impact of data loss, according to EMC. …

stairs
Control system security compliance: Assess risk before it’s too late

Cybercrime is no longer a problem restricted to IT. The Department of Homeland Security recently warned that thousands of industrial control systems (ICS) can be hacked …

secure
Cyber threats today: Significant and diverse

Insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives, according to Accenture. Of those surveyed, 69 percent …

Cloud Signature Consortium
Building a new open standard for cloud-based digital signatures

On July 1, 2016, a new European Union signature regulation (eIDAS) will go into effect, helping pave the way for global adoption of secure digital signatures. Aligned with …

cloud binary
Cloud security and data privacy laws

In this podcast recorded at Infosecurity Europe 2016, Willy Leichter, VP of Cloud Security at CipherCloud, talks about issues around cloud security and data privacy laws, and …

skull
6 tips to prevent ransomware attacks

Hospital extortions, ransomware for Macs, and more – 2016 appears to be the year of ransomware. This malicious software allows attackers to access your computer, encrypt …

Google Chrome
Chrome vulnerability lets attackers steal movies from streaming services

A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion …

magnify
Week in review: Hackers targeting healthcare, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Exfiltrating data from air-gapped computers by modulating fan speed For the last few …

mobile device
How MDM software exposes your personal data

Bitglass tracked the personal mobile devices of several willing employee volunteers with mobile device management (MDM) software to understand how MDM could be misused and to …

Don't miss

Cybersecurity news