CIO - When it comes to securing business-technology systems, CIOs face a challenge that won't go away. The problem isn't necessarily new attack techniques, insecure software or even the latest government regulations. Rather, it's the ...
Tags: CIOs, CSOs, business technology systems, techniques, software
A team of researchers has created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet. The malware installs a special driver on the ...
Tags: malware, USB, smart card readers, infected Windows computer, Internet
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
A Cisco Linksys router update which connected customers' routers to its Connect Cloud service without their knowledge and the company's licensing terms around user data has recharged privacy and security concerns surrounding cloud services. ...
Tags: Cisco, router, update, cloud services, privacy, security
The proper management of information security is one of the most important things that public organizations and private businesses should think of as the security of the company data is a major issue. The proper management of the ...
Tags: IT Security, Computer Products, Siscon
The Government Procurement Service has published a£1bn tender for IT services. The request said the maximum number of participants in the four-year framework was 680,which will include central government departments and their ...
A survey released by Lieberman Software Corporation has revealed that half (51%) of IT experts whose job roles focus on the cloud don’t trust the cloud for any of their personal data such as contact lists, music, photos, or Webmail. ...
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
Over half of CIOs fail to test cloud vendors' security systems and procedures before selecting the provider, according to a survey of 250 senior IT decision-makers. The research, conducted by IT recruitment consultancy Robert Half ...
Tags: CIO, cloud vendors, security, UK
HERZELIA, ISRAEL, July 12, 2012 /24-7PressRelease/ -- Alentus announced today its partnership with GamaSec, a remote online website security scan service. GamaScan identifies web application vulnerabilities, provides real-time vital ...
Tags: Alentus, GamaSec, online website security scan service
The Cloud Security Company, today announced the release of Panda IT SOS, an international contest where participants can share all those hilarious or utterly bizarre moments that most IT professionals have all experienced when dealing with ...
New solutions provide complete protection against all kinds of threats with minimum impact on PC performance thanks to their cloud technologies The new Scan Manager scans up to 70 percent faster BERKSHIRE, ENGLAND, September 09, 2012 ...
Tags: Panda Security, Computer Products, Consumer Antivirus Solutions
Latest Virus Bulletin review allows for cloud-based scanning and showcases Panda Security's superior detection capabilities. Panda Cloud Antivirus Pro is one of the 34 certified solutions (out of 51 tested products). BERKSHIRE, ENGLAND, ...
Tags: Panda Cloud, VB100 Certification, Computer Products, Achieves Virus