The Department of Homeland Security (DHS) has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it. Phishers, the agency said in an alert this week, look ...
Tags: web pages, social media
The Better Sleep Council only asked this question of consumers who don't sleep in separate bedrooms, which is the vast majority of consumers. You will recall that in a recent Selling Sleep report, we noted that 9% of consumers responding to ...
Tags: Light Industry, Daily Use
A pair of MIT professors and security researchers whose work paved the way for modern cryptography have been named winners of the 2012 A.M. Turing Award, also known as the "Nobel Prize in Computing." Shafi Goldwasser, the RSA professor of ...
Tags: Computer Products, soft ware, google
Sepaton today announced major upgrades to its enterprise-class backup appliance -- almost doubling the backup speed -- added encryption for data at rest, and increased connectivity from 4Gbps to 8Gbps Fibre Channel and 10Gbps Ethernet. ...
Tags: Sepaton, high end storage appliance, HP
How did you sleep last night? That's a good opening question when a retail sales associate welcomes a customer into his or her mattress department or mattress shop. It gets right at the key issue of quality of sleep, and providing a good ...
Tags: retail sales, mattress, RSAs
Most mattress retail sales associates have at least an hour of down time in a typical work day, a survey of RSAs done for Leggett & Platt reveals. And one-third of those RSAs have more than three hours of down time a day. Mark Quinn, ...
Tags: mattress retail, furniture, furnishing
The company is the latest to be attacked after recent cyber attacks on Apple, Facebook and Twitter. Evernote's security team discovered suspicious activity in its network which attempted to access secure areas of its service. Evernote ...
Tags: cyber attack, Apple, Facebook, Twitter
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Over the past few years, the ...
Rights advocacy groups and security practitioners remain on opposite ends of the spectrum on the merits of sharing information as a means to improve cyber security. The Electronic Frontier Foundation, the Center for Democracy and ...
Tags: rights advocacy, sharing information, Electronic Frontier Foundation
Applying big data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held ...
Tags: information security, RSA Conference 2013, data aggregation
Security company, FireEye, has announced a new threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many traditional defences, such as firewalls and anti-virus, are not enough ...
Researchers from security firm Symantec have found and analyzed a version of the Stuxnet cybersabotage malware that predates previously discovered versions by at least two years and used a different method of disrupting uranium enrichment ...
Tags: Symantec, Stuxnet cybersabotage malware, disrupting uranium enrichment
Tokio Marine Europe Insurance (TMEI) has appointed two new underwriters in an effort to further strengthen its UK team. The company has hired Stuart Wolstenholme as Property and Liability senior underwriter at the London Underwriting ...
Tags: TMEI, new underwriters, UK team
Anti-virus software vendors have unveiled a number of upgrades to their systems, including new heuristic detection based on their signature databases, and new protections against botnets. Trend Micro has introduced new tools in its Custom ...
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM