Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
There are about 2.2 million people working as information security professionals today, says Hord Tipton, executive officer for security education and credentialing organization (ISC)2 and former CIO of the U.S. Department of the Interior. ...
Worldwide spending on security is expected to touch the $60 billion mark in 2012, up 8.4 percent from $55 billion in the previous year, according to research company Gartner — this figure will approach $86 billion in 2016. "The ...
Tags: Gartner, highlightedpost, network, research, security
Ireland top least-malware-infected nations for the first time PandaLabs, Panda Security's antimalware laboratory, today published its Quarterly Report for Q3, analyzing the IT security events and incidents from July through September ...
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Despite the downturn, 40% of organisations plan to increase their security budgets in 2013 in ...
Tags: IT security, security budget, security spending, IT industry
More than half of office workers don’t follow their company’s IT security policies, or aren’t even aware of the policies, according to survey results collected by Xerox and McAfee. The joint data survey held by the two ...
Tags: Embedded Control software, IT security, malware, McAfee, Viruses, Xerox
The UK should declare cyber war on states and criminals who target the country by using aggressive retaliatory strikes, says Parliament's Intelligence Security Committee (ISC). The call comes in the ISC's annual report, which says too ...
Tags: UK, cyber war, criminals, aggressive retaliatory strikes, ISC
Barracuda Networks is exhibiting at GITEX and for the first time will be demonstrating its new Web Application Firewall 7.7 (Hall 1, stand B1-17). At the event, Sherif AbdelElGawad, Barracuda Networks’ General Manager Middle East ...
Tags: Barracuda Networks, GITEX, Networks, Internet
WatchGuard Technologies has announced today that it is the first UTM security appliance vendor to offer a firewall that configures itself. The company is adding a new cloud-based configuration utility – RapidDeploy – that ...
Tags: WatchGuard, security appliance, WatchGuard devices, network security
Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) systems from businesses in 40 countries in the past few months and stole the data of tens of ...
Tags: data, dexter, highlightedpost, israel, malware, POS, research, seculert
Half of companies worldwide lack knowledge about potential security threats they may face, a global IT risks survey has revealed. Almost a third of more than 3,000 IT professionals, including 200 from the UK, polled by security firm ...
IDC Government Insights research arm has published a top 10 predictions list for 2013. The predictions are: 1. Consumerisation of IT and transformational cloud developments will continue to create more challenges than opportunities 2. ...
Tags: IDC Government, 10 predictions
Advanced persistent threats (APTs) are real and all companies should be taking them seriously, says telecommunications company AT&T. In the past year, the company has set up an IT security team dedicated to researching APTs and making ...
It has been reported that detectives from the Police Central e-Crime Unit (PCeU) have arrested three people in connection with using ransomware to blackmail people. It has been alleged that computer users were targeted and led to believe ...
Tags: PCeU, ransomware, blackmail people
Panda Security,The Cloud Security Company,today announced the launch of Panda GateDefender Performa eSeries,its new,unified perimeter security device that protects against all types of threats.Panda Security's new appliance enables mid-size ...