Medical devices often use commercial PCs and have wireless connections that make them vulnerable to malware, or require software updates for security, but the U.S. may not be doing an adequate job tracking these risks, researchers ...
Tags: Medical-Device Security, security IT, malware, computer technology
More companies have dipped a toe into the Federated ID waters. But has the technology finally made it to prime time? Not really, according to two academic scholars specializing in the economics of information security technology. Many ...
Tags: Federated ID, technology, logistic hurdles
IT Governance Ltd, the PCI and information security experts, have reported that organisations required to comply with the PCI DSS standard, are increasingly deploying PCI DSS Staff Awareness e-learning to meet requirement 12.6 of the ...
Tags: PCI DSS, PCI DSS Standard, information security experts
The Secure Decisions Division of Applied Visions has released a new version of its wireless network security visualization tool, MeerCAT Pro Version 4.0. NORTHPORT, NY, August 26, 2012 /24-7PressRelease/ -- MeerCAT, a visualization tool ...
Tags: Secure Decisions, MeerCAT, wireless network, security visualization tool
Mandatory risk management for social networks could form part of a European Commission legislative proposal on network and information security, it was revealed as a public consultation on the issue was announced on Monday. Europe's law ...
Tags: EU, New Rules, Cybersecurity, social networks could
Unguarded corporate social media accounts are leaving companies exposed to serious security breaches, a survey of more than 1,000 senior UK executives has revealed. Most respondents (87%) said they use social media strategies to enhance ...
Tags: social media accounts, information security, security scare, network
IT security professionals need to transform the profession if they are to persuade business they are doing a good job, according to Mark Brown, director of information security at Ernst & Young. “Most organisations think information ...
Tags: IT security, information security, Global Information Security Survey
The government has announced a scheme to help UK organisations respond effectively to the increase in cyber attacks. The scheme is backed by CESG, the Information Assurance arm of GCHQ, and the Centre for the Protection of National ...
Tags: UK, cyber attacks, Protection of National Infrastructure
Incident response investigations are increasingly showing businesses cannot rely on antivirus systems alone for protection, say security researchers. The gap is widening between the common malware threats most antivirus systems will ...
Tags: antivirus systems, security researchers, Ziv Mador, banking malware
Electronics firm Philips has called on skills specialist The Open Group to reorganise its IT workforce. The move enables Philips to identify the skills already available within its company and to create a clear career development path ...
Tags: Philips, IT workforce, network, CITS
Government departments have been given the go-ahead to use iPhones to send and receive sensitive emails, as part of moves to broaden the number of approved public sector mobile devices beyond BlackBerrys. Under new guidelines, civil ...
Tags: iPhone, mobile device, Apple device, BlackBerry
Cloud computing is all about cutting costs, but some organisations that are going down that road are reporting increased cost instead. How is this possible? According to Marc Noble, director of government affairs for (ISC)2, he knows of ...
Tags: cloud computing, Marc Noble, cloud implementation, cloud services
Only 8% of European companies plan to decrease spending on antivirus and antimalware in 2013, a survey of IT security purchasing intentions has revealed. Some 21% of more than 250 IT professionals polled by Computer Weekly and TechTarget ...
Tags: European companies, antivirus, IT security, TechTarget
The University of Warwick has entered an agreement with information security professional body (ISC)2 to support the entry of its cyber security masters graduates into the workforce. Students will be able to complete a compact Certified ...
Tags: University of Warwick, CISSP, cyber security, IT security community
SkyDox, a leading provider of cloud-enabled file sharing, synchronization, storage, and collaboration tools, today announced that it has been awarded the Best Web Tool 2012 accolade by Web Hosting Search. LONDON, ENGLAND, June 21, 2012 ...
Tags: cloud-enabled file sharing tools, synchronization tools, storage tools