According to a survey of 56 corporate and governmental organisations conducted by the Ponemon Institute, the average amount paid for all the costs associated with cyber attacks was $8.9 million during the past year. That’s up 6% from ...
Tags: costs, cyber attacks, cyber criminals, cybercrime, highlightedpost, Ponemon
An inquiry is underway after the website of Conservative MP David Morris was hacked at the weekend. David Morris,MP for Morecambe&Lunesdale,said an organisation claiming to represent"Freedom for the Mujahideen"had taken over his website ...
Tags: MP's website, David Morris, Hactivists, enterprise security
Cloud-based intelligence databases Customised risk tolerance Signature approach combined with local behavioral analysis Protecting systems offline File-scanning misses the big picture Read more about cloud and security Security continues ...
Tags: Cloud-based, intelligence databases, Security, anti-virus
While the risk of being hacked,conned or having sensitive information stolen is possible all through the year,most security experts agree that the holiday season brings a spike in fraudulent activity,both online and off. CSO compiled a ...
Tags: Christmas, Fraudulent auction, payment sites
Westinghouse Electric Company and McAfee have announced a partnership around information security for nuclear power plants at McAfee Focus 2012 in Las Vegas. Westinghouse will use McAfee Enterprise Security Manager and Network Intrusion ...
Tags: Westinghouse Electric Company, McAfee, Las Vegas, Prevention Systems
Computerworld - HP has agreed to transfer 3,000 of its employees to the General Motors payroll, as the automaker moves IT operations in-house, the two companies announced Thursday. GM CIO Randy Mott said the car company hopes to add the ...
IDG News Service-Box announced on Tuesday a set of new and improved enterprise security and IT management features for its cloud-based file sharing and storage service. The enhancements focus on areas including data loss ...
Tags: file sharing, storage service, Box, cloud-based
Cloud computing,IT consumerisation and the evolving threat landscape are forcing IT departments to rethink security. Analyst Gartner has predicted context-aware security will be the preferred method for IT to evolve enterprise security to ...
Tags: predicted context-aware security, Cloud computing, IT consumerisation
In what it says is an attempt to turn the tables on malicious hackers,security vendor Prolexic on Tuesday released details of vulnerabilities it has discovered in a toolkit family used by hackers to launch distributed denial of service ...
Tags: security vendor Prolexic, vulnerability, malicious hackers, DDoS
Network World - Fidelis Security Systems has an interesting perspective on the world of security, working, as it does, with the U.S. government to keep other countries from prying into some of our nation's most critical networks. Now that ...
Tags: Foreign, Governments, U.S.
Security researchers released two tools at the Defcon security conference that can be used to crack the encryption of any PPTP (Point-to-Point Tunneling Protocol) and WPA2-Enterprise (Wireless Protected Access) sessions that use MS-CHAPv2 ...
Tags: Microsoft, PPTP, US, Cyberwarfare
In a deal that should help Apple boost its enterprise security offerings, the iPhone maker is planning to buy mobile security company AuthenTec for $8 per share or a little over $356 million, AuthenTec said on Friday. AuthenTec provides ...
Security experts say the breach that led to the publication of the login details of more than 453,000 Yahoo and other companies'customers,highlights common enterprise security failings. The hacking group,known as D33Ds Company,said they ...
Tags: Security, Yahoo Voices, Hacking Group, Application
If you rely on Research in Motion's BlackBerry smartphones, it's time to prep your exit strategy. RIM is in serious decline, and the slide has accelerated dramatically in recent weeks. The company has made massive layoffs, its stock price ...
Tags: BlackBerry, smartphones, Android, iOS, mobile devices
Referral marketing firm chose security-as-a-service leaders CloudAccess to deploy an upgraded IT enterprise security solution managed from the cloud LOS ANGELES, CA, June 28, 2012 /24-7PressRelease/ -- Viva Concepts' explosive growth over ...
Tags: IT enterprise security solution, cloud-based security service