ROAM Inc., the leading mCommerce Platform-as-a-Service (PaaS) provider, announced that TaylorMade-adidas Golf Company is the first retail customer to integrate ROAM's software developer's kit (SDK) in its TaylorMade Performance Labs (TMPL). ...
Tags: ROAM, SDK, PaaS, TaylorMade, NFC
The IT Security professional is there to ensure that an organisation's information is not compromised,whether you are an acquirer,a target or a party to a merger. From the acquirer's perspective,there are some very simple questions that ...
Tags: Security Think Tank, Essential security questions, MandAs
Cost pressures and the rise of cloud computing have led many businesses to turn to lower-cost virtual environments on premise and in the cloud, but a lack of expertise and experience may be exposing these organisations to unnecessary ...
Tags: cloud computing, virtual server, physical server, physical networks
The US is at risk of a "cyber-Pearl Harbour" attack from overseas hackers and needs to take precautions against such threats. Government systems, financial networks, transport and the national power grid are all potential targets for ...
Tags: cyber-Pearl Harbour, Leon Panetta, cyber actors, cyber criminals
Twenty-two U.S.privacy and consumer groups have voiced support for a tough online privacy proposal being considered by the European Union,even though some U.S.businesses and government officials have described the proposal as too ...
Tags: U.S., EU, EU's Proposed Privacy Rules, privacy protections online
The night watchman and the IT security guy rarely work together even though their jobs,at the core,are similar:to protect the company.At many organizations,physical and information security remain separate entities by happenstance and by ...
The White House has announced that US President Barack Obama is considering issuing orders compelling or encouraging private companies in critical industries to improve their cyber defences. The announcement comes a week after Congress ...
Security firm Entrust has announced that it is withdrawing from a voluntary online security standards organisation that it co-founded and co-chaired for six years. The move follows the introduction of a mandatory Intellectual Property ...
Tags: SSL, CA/Browser Forum, Security firm, the IPR policy
Despite a years-long upgrade of Australia's payment systems, fraudsters are still profiting, leaving a questionable record for a vast program to equip debit and credit cards with new security features. For several years, Australia has ...
Tags: Australia, payment system, Cybercrime, EMV payment card
The US Cybersecurity Bill, originally intended to dictate minimum standards of online security for critical infrastructure in the US, has been voted down in the Senate over criticisms that it gave authorities too much power to spy on users. ...
Tags: Cybersecurity Bill, Joe Lieberman, digital Dark Ages, cyber security
Complaints over the past several weeks from Dropbox users whose email addresses have been targeted with spam have finally been answered by the company,which has admitted the possibility that an employee's company email was hacked,and a list ...
Tags: Dropbox, web service, LinkedIn, SafeNet
Denise McDonagh, director of the government's G-Cloud programme, talks to Computer Weekly about the implementation challenges of the programme and the routes being taken to break government's dependence on large outsourcers. To describe ...
Tags: Interview, G-Cloud programme, cloud frameworks, big legacy systems
Retail chip and PIN devices can be attacked easily,exposing banks,retailers and customers to fraud. Researchers from Basingstoke-based MWR InfoSecurity demonstrated at the 2012 Black Hat conference in Las Vegas that it is possible to ...
Tags: Retail chip and PIN devices, MWR Infosecurity, 2012 Black Hat, Las Vegas