Only four per cent of UK organisations have IT security functions that fully meet their needs, a new survey released by one of the "big four" international professional services firms, Ernst & Young, claims. Ernst & Young's 16th annual ...
Tags: Computer Products, software
Cyber attacks on container ships and port infrastructure will get more sophisticated as time goes on and companies should be doing more to protect their supply chain security. Maritime and IT security companies have raised their concerns ...
Ihab Moawad, Vice President, Trend Micro, Mediterranean, Middle East & Africa Trend Micro will release its finding on the greatest IT security threats to business in the MENA region at GITEX 2013, the company said Sunday. Trend Micro ...
Tags: Computer Products, software
As anticipated, the latest round of Microsoft’s Patch Tuesday monthly release of security fixes addresses a widely known Internet Explorer (IE) vulnerability already being exploited by malicious hackers. Overall, for October’s ...
Petroleo Brasileiro (Petrobras SA), one of the world's largest oil and gas companies, has emphasised that the tapping of its systems by the US National Security Agency (NSA) is a result of political, and not technical issues. The NSA has ...
Tags: Computer Products, software
TransRe, a global reinsurer wholly owned by Alleghany, has selected MetricStream to provide a consolidated approach for an integrated, flexible solution for its risk and compliance management needs. MetricStream's federated information ...
Tags: TransRe, MetricStream Software
The German government has recommended that Federal Administration and other high profile public sector departments in the country do not use Windows 8 because, it warns, it contains security backdoors that cannot be controlled or trusted, ...
Tags: Computer Products, software
IDC expects that China's IT security appliance market will grow 14.7% to US$950 million in 2013; and this figure will reach US$1.56 billion by 2017, with a 2012-2017 CAGR of 13.5%. According to IDC, China's IT security appliance market ...
Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data. Tom Ritter and Doug DePerry , researchers ...
Tags: Phone Calls, Exploit Cellular Tech
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS ...
The global outsourcing market will reach $288bn in value this year, according to analyst group Gartner. The figure represents a modest increase of 2.8 per cent - 5.1 per cent in "constant currency" - compared to 2012. "Nearly all ITO ...
Tags: outsourcing market
South Lanarkshire Council is on the lookout for security software providers in a tender worth nearly £1m. The Scottish council is looking for a partner to deliver a range of IT security-related services and software over a four-year ...
Tags: Computer Products, software
Cisco today announced that 50 schools involved in Azerbaijan's?e-School project have deployed a unified distance learning system based on?Cisco Enterprise Networks. The solution provides the schools with secure and reliable access to data ...
Tags: Cisco, Computer Products
Spending on cyber defence is set to increase despite the coalition government announcing a further £11.5bn of cuts from Whitehall spending set out for 2015-2016. The Treasury announced the decision following a series of phone calls ...
Tags: Cyber Security, Cyber Conflict
According to Protiviti’s 2013 Security and Privacy Survey, a large number of companies are not adequately prepared to respond to a data breach of IT security crisis, despite a broader recognition that cyber threats are more prevalent. ...
Tags: Data Breaches, Security