Enterprises are under heavy pressure to change their approach to IT security because of a "nexus of forces" that include big data, social networking, mobile and cloud computing, according to Gartner. Ray Wagner, managing vice president of ...
Tags: Computer Products, software
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data ...
Tags: Data encryption, Spy-Proof, Surveillance
Most financial services organisations (even the largest ones) have admitted that they do not have the budget to deal with the largest cyber attacks, according to attendees of a recent forum. Comments made at Ballintrae's first IT Security ...
Tags: Cyber Attacks, Computer Products
Many IT security vendors have a minimal understanding of industrial control systems (ICS) and try to sell technology that could easily damage the devices found in plants running the nation’s critical infrastructure, experts say. In ...
Tags: Applied Control Systems, CNME, computer news middle east, congress
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks. The Research and Education Networking Information Sharing and Analysis Center ...
The UK continues to struggle against cyber criminals with no clear victory in sight. That's what the House of Commons Home Affairs Committee heard from the cyber security industry as experts gave evidence about e-crime. "I don't think the ...
Tags: Computer Products, software
Improving users' experiences is no justification for using consumer information in big data projects, according to Europe's top data protection officials. The Article 29 Working Group, which includes the data protection supervisors from ...
Tags: Data, software, Computer Products
System administrators and IT security pros can take bit of a breather: Microsoft issued a comparatively light set of patches for this edition of its monthly release of software vulnerability fixes. "It's a boring Patch Tuesday this month, ...
Tags: Microsoft, Computer Products
Lincolnshire County Council is seeking a new outsourcing partner following the issue of a tender for services, expected to weigh in at between 85m and 110m. The contract is expected to be awarded in April 2014, with the winning bidder ...
Posted by Lisa McTigue Pierce, Executive Editor -- Packaging Digest, 4/5/2013 10:25:45 AM Mederma Stretch Marks Therapy is lighting up retail shelves with a stunning new package upgrade that addresses major retail challenges. The ...
The recent attack on computer networks at broadcasting organisations and banks in South Korea has brought cyber war into the limelight. While the cause of the attacks remains unknown, South Korean authorities say they "do not rule out the ...
Tags: Computer Products, Networks
CompTIA, the non-profit association for the information technology (IT) industry, concluded its fourth Annual Member Meeting this week with heavy focus on how to do business in an increasingly mobile world where technology users expect and ...
Almost nine out of 10 security flaws discovered on PCs running Windows were due to vulnerable third-party applications rather than pre-installed Microsoft software. That's according to a report by security expert Secunia, which examined ...
Tags: Computer Products, software
The Cyber Security Challenge (CSC) is not only about recruiting talent, but is aimed at raising awareness and widening the IT security talent pool, according to the competition's CEO, Stephanie Danan. Danan was responding to Computing's ...
Tags: Cyber Security, IT security, cyber
Eng. Omar Abdullah Al Nomany, Vice President of IT, STC Saudi Arabian STC this week inaugurated what it calls the largest information security control centre in the region to improve the security features of the telco’s systems and ...
Tags: STC, Security Operations Centre, IT