Cloud adoption generates security issues
Globally, the cloud continues to pose challenges on how to deliver agile, yet secure, IT services to enterprises. The percentage of companies that reported a data security …
Identifying and mitigating risk in virtual environments
Accuvant announced its FIDELITYv framework for identifying and mitigating risk in virtual environments which helps organizations realize more secure and agile IT models with …
The Official Ubuntu Book, 7th Edition
Ubuntu is a complete, free operating system that emphasizes ease of use, community, and support while enhancing speed, power, and flexibility. It is designed for everyone from …
Hackers allegedly breached Saudi Aramco again
Saudi Aramco, the national oil company of Saudi Arabia and the biggest oil company in the world, has issued a statement announcing that it has restored all its main internal …
Splunk delivers operational intelligence for the cloud
Splunk announced Splunk Storm, a cloud service based on the Splunk software and is for organizations that develop and run applications in the public cloud, using services such …
Fake Facebook photo notifications carry malware
Fake Facebook notifications informing users that a friend has posted a new photo of them on the social network have been spotted hitting inboxes around the world. The emails …
Trend Micro Deep Security 9 released
Trend Micro announced Deep Security 9, a server security platform designed to provide server, application and data security across physical, virtual and cloud environments …
Map of state data breach notification laws
Current state data breach notification laws are strikingly similar but vary in compliance requirements for businesses, with all laws highlighting the need for companies to …
Safeguard Facebook photos with McAfee Social Protection
McAfee announced the availability of a free public beta of McAfee Social Protection, a new app for Facebook that protects users’ photos from being shared without their …
BYOD is not for every company, or every employee
The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …
What keeps information security leaders awake at night
In this interview, Herbert ‘Hugh’ Thompson, Program Committee Chair for RSA Conferences and Chief Security Strategist at People Security, talks about challenges …
iAlertTag wirelessly secures, alerts, and locates your iPhone
Cirago International released its new iAlertTag (IAT1000), a solution for finding a lost iPhone, keeping an iPhone close by or locking your Windows laptop. iAlertTag creates a …
Featured news
Sponsored
Don't miss
- Scammers dupe chemical company into wiring $60 million
- Australian gold mining company hit with ransomware
- Browser backdoors: Securing the new frontline of shadow IT
- Key metrics for monitoring and improving ZTNA implementations
- Chrome, Edge users beset by malicious extensions that can’t be easily removed