Please turn on your JavaScript for this page to function normally.
CIOs should make digital business tech an IT responsibility

CIOs need to decide how they will position their IT organization in relation to emerging digital business technologies, such as the Internet of Things, 3D printing, wearable …

NIST releases report on cryptography expertise

NIST’s primary external advisory board released a report calling for the agency to increase its staff of cryptography experts and implement more explicit processes for …

Amazon-hosted malware triples in 6 months

Solutionary analyzed the threat landscape and identified the top 10 global ISPs and hosting providers that hosted malware out of more than 21,000 ISPs. Amazon remained the top …

Global action targeting Shylock malware

On 8 and 9 July 2014, an alliance of law enforcement and industry undertook measures against the Internet domains and servers that form the core of an advanced cybercriminal …

DoJ provides update on Gameover Zeus and Cryptolocker disruption

The Justice Department filed a status report with the United States District Court for the Western District of Pennsylvania updating the court on the progress in disrupting …

Raspberry Pi B+ adds connectivity and power features

Launched today, the new Raspberry Pi B+ board, which marks the first significant change to the credit card-sized computer, is available immediately. Priced at $35, the new …

Week in review: Google catches India with fake certificates, and the risks of selling used smartphones

Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam …

IoT privacy tech working group announced

TRUSTe formed a multi-stakeholder IoT Privacy Tech Working Group to identify the technical standards and best practices necessary to help enhance consumer privacy in the …

CryptoLocker is temporarily disabled, users still at risk

Bitdefender warns that while CyptoLocker is currently disabled, it could come back to life at any moment. As such, users need to take precautions to protect against this …

Securing the virtual environment

So you have you a shiny new virtual environment up and running. You may have virtualised all your servers, so that your business-critical databases, CRM systems, ERP …

Empowered Millennials expect BYOD

New data finds that Millennials—the new generation of workers born between the early 1980s and the early 2000s—are highly dedicated to their jobs and often times work well …

Businesses are deprioritizing information security

Businesses are deprioritizing information security and decreasing their investment in the destruction of confidential information, according to Shred-it. According to the …

Don't miss

Cybersecurity news