IBM yesterday announced an agreement to acquire Fiberlink Communications, saying the purchase is a key part of a broader mobile-security strategy to provide assurance in transactions conducted via devices such as iPhones and Android ...
Tags: IBM, Fiberlink, mobile-security, strategy, lynchpin
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS ...
Some of the biggest technology, telecommunications and security firms will share cyber threat intelligence with the government to help increase the security of the defence supply chain, as part of a new government scheme. The scheme ...
Tags: Computer Products, software
Microsoft is seeking permission to disclose "aggregate statistics" about the number of requests for data it receives under the U.S. Foreign Intelligence Surveillance Act, following a similar move by Google earlier this month. FISA has ...
Security monitoring – the type involving traditional security information and event management (SIEM) – can be done in some public cloud environments, according to Gartner. And if you're using public cloud services, it's time to ...
Tags: Security, Public Cloud
Microsoft routinely passes on details of security flaws in its own software to the National Security Agency (NSA) before it has produced and issued patches to users of its software around the world. The news partly confirms widely held ...
A Gartner report about the security software market out today shows that number-two-ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed number three, and Symantec held onto its top spot with 19.6 percent ...
Tags: Gartner, McAfee, Trend Micro
Teaching engineers cyber security skills is vital in order to protect the UK's critical national infrastructure, according to cyber expert at the Institute of Engineering and Technology (IET), Hugh Boyes. The IET is trying to raise ...
Tags: Computer Products, software
Google CEO Eric Schmidt has said that the "lack of a delete button on the internet is... a significant issue". In an interview by economist Nouriel Roubini at New York University's business school, Schmidt was asked what he believed ...
Tags: Google, Computer Products, Internet
Following similar initiatives by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products. "With this release you can ...
Tags: Microsoft, Computer Products, software
Following?similar initiatives?by Apple, Google and Facebook, Microsoft is enabling two-factor authentication for its Microsoft Account service, the log-on service for many of its online and desktop products.? "With this release, you can ...
Tags: Computer Products, Microsoft
Indian outsourcing and services company Infosys has teamed up with Queen's University Belfast to conduct joint research into the global cyber security threat. The partnership brings together Queen's University Belfast's Centre for Secure ...
Tags: Computer Products, Computer
Foreign secretary William Hague has announced the devotion of £500,000 a year to the opening and running of a global cyber research centre to be sited at the Oxford Martin School at the University of Oxford. The Global Centre for ...
The government's investment in cyber security is embarrassing, according to security experts. The government announced plans to invest £650m over a four-year period on cyber security, after the 2010 National Security Strategy rated ...
Tags: Computer Products, software
Analysts say the proposal for internet users to delete their online data and become invisible online could create a black hole in the web economy. Tineka Smith reports. Last year the European Commission announced proposals for the 'right ...
Tags: internet, web economy, cyber security