IBM is set to provide free programmes, training courses and resources for IT professionals and educators in a bid to narrow the skills gap. With the mission of preparing students for real-world business challenges, IBM will be offering ...
Tags: IBM, IT, IT security, Knowledge Exchange
BERKSHIRE, ENGLAND, November 16, 2012 /24-7PressRelease/ -- Panda Security, The Cloud Security Company, today announced the release of its new 2.2 version of Panda Cloud Partner Center, an integrated solution for centrally managing computer ...
Tags: Panda Security, Cloud Security, integrated solution, computer security
Real time defence of business data and IT users through the use of next generation security information and event management (SIEM). Traditional IT security defences have been built using point security products. These are good for ...
Tags: business data, IT, security information, event management
IT security budgets are not being used to provide defence technology in some of the areas the enterprise is most likely to need it in, a study has revealed. About 33% of hacker forum discussions are about training and tutorials for data ...
Tags: IT, Hacker, Computer Products, IT Security
IT infrastructure company SCC has become the first supplier on the government’s CloudStore to win pan-government security accreditation. The firm has gained accreditation for its multi-tenanted infrastructure-as-a-service (IaaS) ...
Tags: SCC, Computer Products, G-Cloud
Securing Good Technology's mobile device management (MDM) offerings while exploring future tech developments is CTO Nicko van Someren's top priorities. Speaking to CIO Australia during the recent Gartner Symposium/ITxpo on the Gold Coast, ...
Tags: Good Technology, MDM, CTO, Nicko van Someren
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
This is the third in a series of interviews with C-level executives responsible for cyber security and privacy in business and government, who also happen to be thought leaders. (Remember, as I mentioned previously, "C-level executive" and ...
Tags: interviews, cyber security, privacy, business, government, web security
Two ISACA qualifications have been named as the two highest-paying IT certifications by Foote Partners' IT Skills and Certifications Pay Index (ITSCPI). The certified information security manager (CISM) and certified in risk and ...
Tags: ISACA, IT certifications, CISM, CRISC, IT skills
Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) systems from businesses in 40 countries in the past few months and stole the data of tens of ...
Tags: IT security firm, Seculert, malware, PoS systems
CSO - It happened more than three and a half years ago. So it presumably would be old news that Chinese hackers broke into soft-drink behemoth Coca-Cola's computer systems and stole confidential files relating to its effort to acquire the ...
Tags: Chinese hackers, Coca Cola, computer system, IT security
There has been an unprecedented volume of malicious code and attacks - including many high profile incidents - in the Middle East during 2012. Attacks ranged from those performed by cyber criminals to hacktivists and in some cases ...
Tags: malicious code, malicious attacks, high profile incidents, IT Security
when the real blame lies with their security solutions providers,according to the founder and CTO of search engine tech firm Simplexo. Further reading Security:Adapt and loosen up,or die,says Gartner ICO to check out Tesco.com security ...
Tags: Simplexo CTO, security solutions providers, Simon Bain, Cloud providers
Normally if you find a rogue outlet strip, or a user happens to bring his or her own surge protector to use you might not think much of it. Thanks to a new device called the Power Pwn, though, it might soon be cause for concern. A company ...
Tags: outlet strip, surge protector, Power Pwn, hacking tool
IT security professionals need to transform the profession if they are to persuade business they are doing a good job, according to Mark Brown, director of information security at Ernst & Young. “Most organisations think information ...
Tags: IT security, information security, Global Information Security Survey