- Antivirus
- IAM
- Risk management
- Data protection
- Continuity
- Cybercrime
- Data Breach Incident Management and Recovery
- Data Breach Incident Management and Recovery
- Web Application Security
- Cloud security
- Compliance Regulation and Standard Requirements
- Secure Coding and Application Programming
- Network Security Management
- Endpoint and NAC Protection
Email Alerts
-
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat reportNews | 14 Nov 2012
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks.News | 13 Nov 2012
-
BYOD devices to double by 2014
The number of consumer devices brought into the workplace will hit 350 million by 2014, according to a study from Juniper ResearchNews | 09 Nov 2012
-
Security data exchange: if McAfee builds it, will they come?
McAfee has announced its Security Connected Plaform for security data exchange, but will other suppliers come to the party?Analysis | 31 Oct 2012
-
Cyber defences of SMEs lag behind larger firms, study confirms
SMEs suffer more from malware than larger organisations, but their security procedures are inferior, says security firm, Kaspersky LabNews | 30 Oct 2012
-
McAfee Focus 2012: McAfee to help secure nuclear plants
Westinghouse Electric Company and McAfee have announced a partnership around information security for nuclear power plantsNews | 24 Oct 2012
-
Security Think Tank: Least privilege is key to blocking IP theft
Intellectual property (IP) theft: Who should be tackling it and how?Opinion
-
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?Analysis | 16 Oct 2012
-
RSA Conference Europe coverage 2012
Read all the news coverage from RSA Conference Europe 2012, in London.guide
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chairSecurity software | 11 Oct 2012
- VIEW MORE ON : Antivirus
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Government funds biometric cyber security research at Southampton University
A cyber security research centre focused on biometrics is to be launched at the University of Southampton, funded by governmentNews | 22 Nov 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm StonesoftNews | 15 Nov 2012
-
Seven firms chosen to provide government's Identity Assurance service
Seven firms have been chosen to provide the Identity Assurance service required for applicants to the new Universal Credit welfare schemeNews | 13 Nov 2012
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks.News | 13 Nov 2012
-
Security Think Tank: Infosec needs to be part of all M&A; processes
What is the role of IT security professionals in mergers and acquisitions?Opinion
-
Firms remain in denial about cyber attacks, says Guidance Software
If cyber attackers want to get into an organisation’s information systems they will find a way, says e-discovery firm Guidance SoftwareNews | 05 Nov 2012
-
Security data exchange: if McAfee builds it, will they come?
McAfee has announced its Security Connected Plaform for security data exchange, but will other suppliers come to the party?Analysis | 31 Oct 2012
-
Government expected to unveil eight IDA suppliers for online services
The government is to announce suppliers – including PayPal, BT and the Post Office – to provide identity assurance (IDA) for online public servicesNews | 25 Oct 2012
- VIEW MORE ON : IAM
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Ovum urges CIOs review MDM policies to support BYOD practices
IT departments must review IT support contracts and invest in mobile device management (MDM) for staff using their own devices at workNews | 28 Nov 2012
-
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attackcyber crime | 27 Nov 2012
-
Half of companies lack cyber threat knowledge
Half of companies worldwide lack knowledge about potential security threats they may face, a global IT risks survey has revealed.cyber crime | 27 Nov 2012
-
Security needs to be integral part of life, says McAfee
The world is becoming increasingly connected and security and privacy are integral to modern society, says Raj Samani, CTO of McAfee EuropeNews | 26 Nov 2012
-
GCHQ aims to tackle open source security clearance problem
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in governmentAnalysis | 23 Nov 2012
-
India tops rankings of countries opposed to BYOD
Nearly half of all Indian companies have security policies prohibiting staff using their own mobile devices for work, an ISACA survey revealsNews | 21 Nov 2012
-
Don’t get spiked by a spear phisher
How to avoid the latest hacking techniques: the telltale signs that a spear phishing attack is in action; how to deflect it; and how to contain damageOpinion
-
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI SoftwareNews | 19 Nov 2012
- VIEW MORE ON : Risk management
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry expertsNews | 29 Nov 2012
-
ICO fines text spammers Tetrus Telecoms £440,000
The Information Commissioner’s Office (ICO) fines marketing firm Tetrus Telecoms £440,000 for sending millions of spam texts to mobile usersNews | 29 Nov 2012
-
Public sector leads on social media use, says KPMG
The private sector’s failure to adapt to the demands of social media poses a threat to the bottom line and reputationsocial media technology | 28 Nov 2012
-
Zero-day exploit for Yahoo Mail goes on sale
Hacker sells $700 zero-day exploit for Yahoo Mail that allows attacker to use cross-site scripting vulnerability to steal cookies and hijack accountsNews | 27 Nov 2012
-
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attackcyber crime | 27 Nov 2012
-
Half of companies lack cyber threat knowledge
Half of companies worldwide lack knowledge about potential security threats they may face, a global IT risks survey has revealed.cyber crime | 27 Nov 2012
-
Security needs to be integral part of life, says McAfee
The world is becoming increasingly connected and security and privacy are integral to modern society, says Raj Samani, CTO of McAfee EuropeNews | 26 Nov 2012
-
Cyber attack reporting will boost defence capability, says Neelie Kroes
The European Commission is considering making it mandatory for companies to report cyber attacks, says vice-president Neelie KroesNews | 26 Nov 2012
- VIEW MORE ON : Data protection
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry expertsNews | 29 Nov 2012
-
Zero-day exploit for Yahoo Mail goes on sale
Hacker sells $700 zero-day exploit for Yahoo Mail that allows attacker to use cross-site scripting vulnerability to steal cookies and hijack accountsNews | 27 Nov 2012
-
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attackcyber crime | 27 Nov 2012
-
Four UK youths charged with PayPal £3.5m Anonymous cyber attacks
Four UK youths acting in the name of hacker group Anonymous cost PayPal £3.5m with cyber attacks carried out 2010, a court has heardNews | 23 Nov 2012
-
India tops rankings of countries opposed to BYOD
Nearly half of all Indian companies have security policies prohibiting staff using their own mobile devices for work, an ISACA survey revealsNews | 21 Nov 2012
-
Don’t get spiked by a spear phisher
How to avoid the latest hacking techniques: the telltale signs that a spear phishing attack is in action; how to deflect it; and how to contain damageOpinion
-
Security Think Tank: Ask the right data security questions in M&As;
What role do IT security professionals play in mergers and acquisitions?Opinion
-
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staffNews | 16 Nov 2012
- VIEW MORE ON : Continuity
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry expertsNews | 29 Nov 2012
-
Public sector leads on social media use, says KPMG
The private sector’s failure to adapt to the demands of social media poses a threat to the bottom line and reputationsocial media technology | 28 Nov 2012
-
Zero-day exploit for Yahoo Mail goes on sale
Hacker sells $700 zero-day exploit for Yahoo Mail that allows attacker to use cross-site scripting vulnerability to steal cookies and hijack accountsNews | 27 Nov 2012
-
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attackcyber crime | 27 Nov 2012
-
Half of companies lack cyber threat knowledge
Half of companies worldwide lack knowledge about potential security threats they may face, a global IT risks survey has revealed.cyber crime | 27 Nov 2012
-
Security needs to be integral part of life, says McAfee
The world is becoming increasingly connected and security and privacy are integral to modern society, says Raj Samani, CTO of McAfee EuropeNews | 26 Nov 2012
-
Cyber attack reporting will boost defence capability, says Neelie Kroes
The European Commission is considering making it mandatory for companies to report cyber attacks, says vice-president Neelie KroesNews | 26 Nov 2012
-
(ISC)² information security scholarships available
(ISC)² is inviting applications for scholarships worth a total of more than £90,000 to promote information security studiesIT training | 26 Nov 2012
- VIEW MORE ON : Cybercrime
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
AWS re:Invent: Users hold back from putting sensitive data in the cloud
Despite the benefits of cloud and a "cloud-first" strategy, security concerns are stopping many users putting sensitive data in the cloudAnalysis | 29 Nov 2012
-
Cyber attack reporting will boost defence capability, says Neelie Kroes
The European Commission is considering making it mandatory for companies to report cyber attacks, says vice-president Neelie KroesNews | 26 Nov 2012
-
Four UK youths charged with PayPal £3.5m Anonymous cyber attacks
Four UK youths acting in the name of hacker group Anonymous cost PayPal £3.5m with cyber attacks carried out 2010, a court has heardNews | 23 Nov 2012
-
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staffNews | 16 Nov 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm StonesoftNews | 15 Nov 2012
-
IT professionals too trusting of Generation Y
While most IT managers think employees stick to policy, most 18- to 30-year-olds play by their own rules, using personal devices at workNews | 14 Nov 2012
-
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat reportNews | 14 Nov 2012
-
Will the ICO’s 'big stick' approach backfire long-term?
The ICO claims to be about helping organisations to do the right thing, yet it punishes those that report breaches. Is this really a good policy?Analysis | 13 Nov 2012
- VIEW MORE ON : Data Breach Incident Management and Recovery
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry expertsNews | 29 Nov 2012
-
Public sector leads on social media use, says KPMG
The private sector’s failure to adapt to the demands of social media poses a threat to the bottom line and reputationsocial media technology | 28 Nov 2012
-
Half of companies lack cyber threat knowledge
Half of companies worldwide lack knowledge about potential security threats they may face, a global IT risks survey has revealed.cyber crime | 27 Nov 2012
-
GCHQ aims to tackle open source security clearance problem
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in governmentAnalysis | 23 Nov 2012
-
India tops rankings of countries opposed to BYOD
Nearly half of all Indian companies have security policies prohibiting staff using their own mobile devices for work, an ISACA survey revealsNews | 21 Nov 2012
-
Don’t get spiked by a spear phisher
How to avoid the latest hacking techniques: the telltale signs that a spear phishing attack is in action; how to deflect it; and how to contain damageOpinion
-
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI SoftwareNews | 19 Nov 2012
-
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staffNews | 16 Nov 2012
- VIEW MORE ON : Data Breach Incident Management and Recovery
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Zero-day exploit for Yahoo Mail goes on sale
Hacker sells $700 zero-day exploit for Yahoo Mail that allows attacker to use cross-site scripting vulnerability to steal cookies and hijack accountsNews | 27 Nov 2012
-
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attackcyber crime | 27 Nov 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm StonesoftNews | 15 Nov 2012
-
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat reportNews | 14 Nov 2012
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks.News | 13 Nov 2012
-
Millions worldwide use insecure browsers, says Kaspersky
Nearly a quarter of all internet users worldwide are running outdated browsers, creating huge gaps in online security, says KasperskyNews | 12 Nov 2012
-
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study showsNews | 30 Oct 2012
-
XSS attacks remain top threat to web applications
Cross-site scripting (XSS) attacks remain the top threat to web applications, databases and websites, a study from FireHost revealsNews | 22 Oct 2012
- VIEW MORE ON : Web Application Security
-
More security, high-availability and gov-cloud are on AWS users’ wish list
Better security, ease of use, added availability as well as G-cloud features could make AWS cloud more appealingNews | 03 Dec 2012
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
AWS re:Invent: Users hold back from putting sensitive data in the cloud
Despite the benefits of cloud and a "cloud-first" strategy, security concerns are stopping many users putting sensitive data in the cloudAnalysis | 29 Nov 2012
-
Forrester: The impact of cloud on outsourcing contracts
Although still in its early stages, the transition of outsourcing engagements toward cloud-based models has begunOpinion
-
Cyber attack reporting will boost defence capability, says Neelie Kroes
The European Commission is considering making it mandatory for companies to report cyber attacks, says vice-president Neelie KroesNews | 26 Nov 2012
-
GCHQ aims to tackle open source security clearance problem
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in governmentAnalysis | 23 Nov 2012
-
EU launches European Cloud Partnership steering board
The steering board of the European Cloud Partnership has met in Brussels to build an EU Digital Single Market for cloud computingNews | 20 Nov 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm StonesoftNews | 15 Nov 2012
-
CW500: Inside the government's CloudStore
The government's cloud store means an end to the big four to five-year IT projects of the past, says the CloudStore lead of the G-Cloud programmeFeature
- VIEW MORE ON : Cloud security
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
ICO fines text spammers Tetrus Telecoms £440,000
The Information Commissioner’s Office (ICO) fines marketing firm Tetrus Telecoms £440,000 for sending millions of spam texts to mobile usersNews | 29 Nov 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm StonesoftNews | 15 Nov 2012
-
Outsourcing reference data management
Andy Efstathiou assesses the case for outsourcing reference data managementOpinion
-
Will the ICO’s 'big stick' approach backfire long-term?
The ICO claims to be about helping organisations to do the right thing, yet it punishes those that report breaches. Is this really a good policy?Analysis | 13 Nov 2012
-
CW500: The legal risks of migrating to the cloud
Experts from the public and private sectors discuss the legal challenges of moving to the cloudFeature
-
NHS set to challenge ICO fine
An NHS trust is to challenge a monetary penalty notice issued by the Information Commissioner's Office in a case that could set an important precedentNews | 13 Nov 2012
-
Video interview: Stephen Mann, Forrester, on IT asset management
In this video, Forrester analyst Stephen Mann discusses the benefits of strong IT asset management processes within IT departmentsVideo
-
Security Think Tank: Infosec needs to be part of all M&A; processes
What is the role of IT security professionals in mergers and acquisitions?Opinion
- VIEW MORE ON : Compliance Regulation and Standard Requirements
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm StonesoftNews | 15 Nov 2012
-
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat reportNews | 14 Nov 2012
-
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks.News | 13 Nov 2012
-
Mobile Security Strategies
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.News | 13 Nov 2012
-
Trusted computing for industrial control systems and infrastructure
The Trusted Computing Group’s open standards now include specifications for securing industrial control systems and infrastructureOpinion
-
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study showsNews | 30 Oct 2012
-
XSS attacks remain top threat to web applications
Cross-site scripting (XSS) attacks remain the top threat to web applications, databases and websites, a study from FireHost revealsNews | 22 Oct 2012
-
RSA Conference Europe coverage 2012
Read all the news coverage from RSA Conference Europe 2012, in London.guide
- VIEW MORE ON : Secure Coding and Application Programming
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry expertsNews | 29 Nov 2012
-
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attackcyber crime | 27 Nov 2012
-
GCHQ aims to tackle open source security clearance problem
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in governmentAnalysis | 23 Nov 2012
-
Evasion threat to critical systems goes ignored, says Stonesoft
Many organisations continue to rely on ineffective intrusion prevention systems (IPS), says security firm StonesoftNews | 16 Nov 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm StonesoftNews | 15 Nov 2012
-
Security Think Tank: In M&As;, watch the exits
What is the role of IT security professionals in mergers and acquisitions?Opinion
-
UK citizens back pre-emptive cyber strikes, poll shows
Nearly two-thirds of UK citizens back pre-emptive cyber strikes on states that pose a credible threat to national security, a survey has revealedNews | 13 Nov 2012
-
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealedNews | 13 Nov 2012
- VIEW MORE ON : Network Security Management
-
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.Security | 03 Dec 2012
-
Download: Secure your data
This is a guide for CEOs and COOs and CIOs who need to understand the importance of data security issues.Magazine
-
Ovum urges CIOs review MDM policies to support BYOD practices
IT departments must review IT support contracts and invest in mobile device management (MDM) for staff using their own devices at workNews | 28 Nov 2012
-
India tops rankings of countries opposed to BYOD
Nearly half of all Indian companies have security policies prohibiting staff using their own mobile devices for work, an ISACA survey revealsNews | 21 Nov 2012
-
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI SoftwareNews | 19 Nov 2012
-
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staffNews | 16 Nov 2012
-
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm StonesoftNews | 15 Nov 2012
-
IT professionals too trusting of Generation Y
While most IT managers think employees stick to policy, most 18- to 30-year-olds play by their own rules, using personal devices at workNews | 14 Nov 2012
-
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat reportNews | 14 Nov 2012
-
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealedNews | 13 Nov 2012
- VIEW MORE ON : Endpoint and NAC Protection