The Reserve Bank has denied reports that its computer systems or networks have been compromised by hackers, saying that at no point has any data or information been lost or its systems corrupted. Responding to a report in yesterday's ...
Tags: IT security, computer systems, cyber attacks
The Cyber Security Challenge, a series of national events designed to encourage talented professionals to join the UK IT security industry, has just announced its latest winner, 28-year-old chemist Stephen Miller. Government cyber ...
Tags: Cyber Security Challenge, IT security industry, cyber security
Demand for information security experts in the United States is outstripping the available supply by a widening margin, according to a pair of recently released reports. A report from Burning Glass Technologies, which develops ...
Tags: information security, Burning Glass Technologies, cybersecurity
According to a pair of recently released reports, demand for information security experts in the United States is outstripping the available supply by a widening margin. A report from Burning Glass Technologies, which develops ...
Tags: information security experts, United States, widening margin
Under pressure from federal regulators to implement electronic health systems, healthcare providers are struggling to find and keep a technology staff in what is the fastest growing IT sector in the U.S. A Healthcare Information and ...
Tags: PCEHR, electronic health systems, Health
The company is the latest to be attacked after recent cyber attacks on Apple, Facebook and Twitter. Evernote's security team discovered suspicious activity in its network which attempted to access secure areas of its service. Evernote ...
Tags: cyber attack, Apple, Facebook, Twitter
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Over the past few years, the ...
Rights advocacy groups and security practitioners remain on opposite ends of the spectrum on the merits of sharing information as a means to improve cyber security. The Electronic Frontier Foundation, the Center for Democracy and ...
Tags: rights advocacy, sharing information, Electronic Frontier Foundation
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts. Over the past few years, the security strategies of many companies and ...
Tags: IT security strategies, emerging cyber threats, security strategies
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM
Attackers are using fake versions of a recently released report about a Chinese cyberespionage group as bait in new spear-phishing attacks that target Japanese and Chinese users. The report was released Tuesday by security firm Mandiant ...
Tags: cyberespionage, China, cyber security
Dell executives went on the offensive this week, claiming that the firm can trump Cisco in the information technology security market, as well as holding an edge against powerful rivals such as HP and IBM. “Cisco is a great ...
The so-called "Internet of everything," the rapidly approaching world where objects from refrigerators to factory robots can talk to people and other machines, will create a massive business opportunity worth $14.4 trillion over the next ...
Tags: Cisco, Internet, smart energy grid
BIG business is being targeted by cyber-criminals in "ransomware" attacks, threatening deletion or freezing of crucial business files unless money is paid. A new national survey of Australian big business reports that in September last ...
Tags: TriQuint, IT security, firewalls
Outsourcing has been identified as a key attack vector in almost two-thirds of security investigations carried out by security services company Trustwave. The claim was carried in the company's 2013 Global Security Report, which draws ...