Please turn on your JavaScript for this page to function normally.
What healthcare security and privacy pros wish for

2013 proved to be a dizzying year for healthcare compliance, privacy, and information security: the Affordable Care Act, enforcement of the HIPAA Omnibus Final Rule, and …

The security realities of the Internet of Things

SANS announced results of its 2013 Securing the Internet of Things survey, in which 391 IT professionals answered questions about the current and future security realities of …

Biometric open protocol standard for safer authentication established

While biometrics are becoming a ubiquitous component of securing consumer data on mobile and other digital devices, there is no industry standard in place to protect that data …

ENISA issues report on how to act after power cuts

EU cyber security Agency ENISA has issued a new report studying network outages caused by power cuts in detail, resulting in key findings and recommendations to the electronic …

NSA employee will remain as co-chair on crypto standards group

NSA employee Kevin Igoe will continue to be one of the two co-chairs of the Crypto Forum Research Group (CFRG), which helps the Internet Engineering Task Force (IETF) review …

New Zeus variant stymies malware analysis, has rootkit capabilities

As expected, variants of the infamous Zeus banking Trojan are becoming more adept at hiding their presence from users and AV solutions, and at preventing malware analysis …

OpenSUSE forums defaced via unknown vBulletin 0-day

The official forums of the openSUSE Linux distribution have been hacked and defaced by a Pakistani hacker that goes by the handle “H4x0r HuSsY.” According to THN, …

Senior managers are the worst information security offenders

As companies look for solutions to protect the integrity of their networks, data centers, and computer systems, an unexpected threat is lurking under the surface—senior …

What drives salary hikes for IT professionals?

The biggest salary increases for IT professionals are for roles that demand specific experience in big data analytics; ecommerce and mobile; and IT security. Salaries for all …

Top priorities for organisations to counter digital criminality

Martin Sutherland, Managing Director, BAE Systems Detica highlights that the single biggest issue that will hit organisations in 2014 will be the rise of digital criminality …

What are the most effective means for achieving IT ops excellence?

Based on results collected across a variety of industry verticals – including financial services, healthcare, manufacturing, and retail – Continuity …

Triggering deep vulnerabilities using symbolic execution

Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths …

Don't miss

Cybersecurity news