CIO-Regardless of the security expertise and resources you apply to securing your assets,you are unlikely to achieve much unless you focus on the most vulnerable element of your organization:your employees. "Computers have become much ...
Tags: secure data, the human element
Personally identifiable information of "at least" 10,000 NASA employees and contractors remains at risk of compromise following last month's theft of an agency laptop, a spokesman told Computerworld via email Thursday. Agency employees ...
Tags: US, computer security, IT industry, NASA
A new Flame and Stuxnet-related cyber-threat,dubbed Gauss,is targeting users in the Middle East,security researchers have revealed. Gauss is a complex,state-sponsored cyber-espionage toolkit with online banking Trojan functionality not ...
Cloud computing services must become more federated and automated to help enterprise IT use them to deliver more for less,according to Intel. "At a time when IT budgets are tight and when the IT teams are expected to deliver more for ...
Tags: Intel, computing services
New Team at GoldKey Tackles Enterprise Security Challenges with Custom-Designed Solutions GoldKey Security Corporation today announced the creation of a GoldKey Special Problems Team. The team was organized to assist enterprise customers ...
Tags: GoldKey, Computer Products, Security, Special Problems
A Cisco Linksys router update which connected customers' routers to its Connect Cloud service without their knowledge and the company's licensing terms around user data has recharged privacy and security concerns surrounding cloud services. ...
Tags: Cisco, router, update, cloud services, privacy, security
A survey released by Lieberman Software Corporation has revealed that half (51%) of IT experts whose job roles focus on the cloud don’t trust the cloud for any of their personal data such as contact lists, music, photos, or Webmail. ...
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
Undoubtedly 2012 has been another big year for mobile. From high-profile launches to security scares, from hot tablets entering the enterprise to huge players trailing with their tails between their legs, mobile is certainly the direction ...
Tags: mobile, security scares, tablet, IT infrastructure
Implementation problems limit the adoption of encryption by some users but still highly popular among businesses for the protection of sensitive data. Almost half of businesses worldwide have started using ...
Tags: Encryption, data protection, encryption technology, protection technique
The Payment Card Industry Security Standards Council (PCI SSC) has released guidance making PCI compliant hosting a must for secure mobile transactions. CHICAGO, IL, November 22, 2012 /24-7PressRelease/ -- The PCI SSC recently issued best ...
Tags: secure mobile transactions, Payment Card, Security Standards
Chief information security officers (CISOs) have an important role in moving their organisations, whether they are public or private, to a cloud computing environment, according to professional certification body (ISC)2. The move is ...
Tags: cloud computing, Chief information security officers, software, computer
Companies must take responsibility for cyber security at board level to tackle the exponential growth in attacks, the government has urged. The warning comes as ministers launch a Cyber Security for Business booklet to encourage company ...
More than one in four Wi-Fi networks in London are poorly secured or not secured at all, a scanning experiment by security firm Sophos has revealed. The experiment was conducted over two days by the firm’s director of technology ...
Tags: WiFi networks, Sophos, technology strategy, wireless network
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed. Android is the most susceptible platform, according to the State of Security in the App Economy report by security firm Arxan Technologies. The ...
Tags: mobile apps, iOS apps, Google Android platform, Hackers