President Barack Obama's cybersecurity executive order, announced during his State of the Union address Tuesday night, elicited guarded praise from several quarters even as it revived calls for more comprehensive bipartisan legislation to ...
Kelheim Fibres is particularly reliable and trustworthy. The AEO C certificate, which Kelheim Fibres has received following a thorough examination by the customs authorities, proves what long-term business partners of the viscose fibre ...
Tags: Kelheim Fibres, AEO C certificate, customs authorities
RSA last week launched its Security Analytics solution in the UAE, promising to leverage big data in order to provide the visibility and context required to help defend against advanced security threats. The new Security Analytics fuses ...
Tags: RSA, UAE, Security Analytics solution
RSA has unveiled a new tool designed to let enterprises detect security threats more quickly than current technologies permit by combining big data management and analytics approaches with traditional network monitoring and threat ...
Tags: RSA, security threats, big data management, analytics approaches
Google thinks it might have found an answer to the vexing problem of forgotten or weak passwords: "physical" passwords, which might come in the form of a piece of jewelry such as a ring. In a research paper, two of its engineers write ...
Tags: Google, passwords, hijacking, online accounts
Nine out of 10 companies do not believe that they are vulnerable to hackers,despite the fact that half have faced a"security incident"in the past year. That is the conclusion of a report into computer security by consultants Deloitte ...
Tags: Nine out of 10 companies not vulnerable, security incident
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
A study found that at the end of 2012, 51% of secure IT networks were breached from employees using personal devices. While over half of large organisations experienced breaches in security, only 25% of small business experienced the ...
Tags: enterprise networks, personal devices, networks, browser
A new report from Deloitte,entitled"Mergers and Acquisitions in the Oil and Gas Industry—Current upstream M&A issues and transaction considerations",looks at the factors affecting investment in Iraq: "Iraqi production,which has ...
Tags: Iraq, Oil and Gas Industry
New laws coming into effect this year will ban employers from demanding access to prospective and current employee social networking accounts. Facebook had announced in March 2012 that it was receiving a "distressing increase in reports" ...
Tags: Facebook, profiles, information, privacy, employers
Verizon's attempt -- unsuccessful so far -- to secure a patent for a so-called 'snooping technology,' which in this case would let television advertisers target individual viewers based on what they're doing or saying in front of their ...
Tags: Verizon, snooping technology, drones, phones, privacy threats
Computerworld-The 2012 Republican Party platform adopted this week calls for a more aggressive U.S.cyber deterrence policy for dealing with security threats against government and civilian targets. The platform,which lists the GOP's ...
Network World-A researcher at North Carolina State University has uncovered a vulnerability that could be exploited to send deceptive text messages from some Android devices,as part of a phishing scheme. MORE ON ANDROID:Hottest Android ...
Tags: Android SMS, vulnerability, phishing scheme
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber