Just over half of IT professionals who focus on cloud computing do not trust cloud services for any of their personal data,a survey has revealed. Some 86%of those polled by Lieberman Software said they do not trust the cloud for their ...
Tags: IT pros, cloud service, cloud computing, IT security, Lieberman
European Network and Information Security Agency (ENISA) has advocated to impose mandatory cyber insurance for firms and urged insurance firms to develop related schemes, which will assist them to save reputational damage. The agency in ...
Tags: ENISA, mandatory insurance, CSO
The Computer Weekly Buyer's Guide will map the IT buying cycle of our readership onto relevant editorial that will inform and educate readers and help them towards making the right buying decision. On a three week cycle the publication ...
Tags: Computer, Products, readership
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in government systems. The initiative has come too late to stop the first big contract wins delivered under the ...
Nearly half of all companies in India have security policies prohibiting employees using their own mobile devices for work purposes,a survey has revealed. A survey by IT security association ISACA polled more than 4,000 members from 83 ...
Tags: India, BYOD, mobile devices, ISACA's research
IDG News Service - Shifting ANZ Banking Group from an Australian and New Zealand centric bank to a super-regional Asia Pacific financial services entity while implementing new technology is Anne Weatherston's top priority for the next five ...
The IT Security professional is there to ensure that an organisation's information is not compromised,whether you are an acquirer,a target or a party to a merger. From the acquirer's perspective,there are some very simple questions that ...
Tags: Security Think Tank, Essential security questions, MandAs
Infoworld - Thinking about the bits of data you leave behind is a one-way ticket to paranoia. Your browser? Full of cookies. Your cellphone? A beacon broadcasting your location at every moment. Search engines track your every curiosity. ...
Tags: Tracks, Online, one-way ticket
Unlicensed copies of popular software Keep up to date Patch applications with security updates Conficker still a threat Malicious key generation(keygen)software is one of the fastest-growing types of a malware,according to the latest ...
Tags: top cyber threats, malicious key, malicious keygen software
Some Web browsers can be tricked into using so-called malicious extensions that can give hackers the ability to hijack the user's session,spy on webcams,upload and download files,and in the newer mobile-device area,hack into Google Android ...
Tags: zombie browsers, malicious extensions, advanced persistent threat, Chrome
Small to medium-sized enterprises(SMEs)suffer more from malware than larger organisations,but their security procedures are lagging behind,says security firm,Kaspersky Lab. SMEs are typically more vulnerable to viruses,worms,spyware and ...
Tags: SMEs, malware, Kaspersky Lab, IT Security
Safety specialist First Choice Facilities has been fined £18,000 for unlicensed software following completion of an acquisition. First Choice Facilities must also pay an additional £81,000 to buy the sufficient software ...
Tags: software, unlicensed software, First Choice Facilities, software licences
The CESG,the Information Assurance(IA)arm of GCHQ,has launched a UK scheme to develop skills and certify IT professionals in IA and cyber security. The CESG Certification for IA Professionals scheme aims to help the government and UK ...
Tags: CESG certification, Information Assurance, cyber security unveiled, UK
IDG News Service-Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages,downloading and executing files,hijacking accounts,bypassing ...
Tags: malware, browser extension, remote-controlled, Balazs
A fifth of lost electronic devices have access to work email,exposing confidential corporate information,a Sophos survey has revealed. Some 42%of lost devices do not have any basic security measures in place,according to a survey ...
Tags: electronic devices, work email, security, Sophos