For the past three years,Nils Puhlmann was head of security for Zynga,the social games company that created mega-hits Farmville and Words With Friends. Managing Zynga's converged security department was a challenging job that Puhlmann ...
Tags: CSO, security industry, Zynga, CSA
Computerworld - A Danish graduate student said he was searching for research material on an IEEE FTP server last week when he stumbled upon the usernames and passwords of about 100,000 members of the professional association. In a blog ...
Tags: IEEE FTP server, web server, IEEE Site, User IDs
Microsoft today said it will release seven security updates next week--including one rated critical for Windows 8 and Windows RT--to patch 12 vulnerabilities in Windows,Office,SharePoint Server and the company's website design software. ...
IDG News Service - Prince George's Community College in Maryland will use a $5 million grant from the U.S. National Science Foundation to address a major concern in cybersecurity circles, that the U.S. isn't producing enough qualified ...
CIO - When it comes to securing business-technology systems, CIOs face a challenge that won't go away. The problem isn't necessarily new attack techniques, insecure software or even the latest government regulations. Rather, it's the ...
Tags: CIOs, CSOs, business technology systems, techniques, software
Removable hard disk storage capacities in 500GB, 1TB, and 1.5TB RDX cartridges deliver affordable video retention with significantly lower TCO. SoleraTec LLC, a provider of innovative video lifecycle management and storage products, ...
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
A Cisco Linksys router update which connected customers' routers to its Connect Cloud service without their knowledge and the company's licensing terms around user data has recharged privacy and security concerns surrounding cloud services. ...
Tags: Cisco, router, update, cloud services, privacy, security
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
Google has been dragged into adopting rival Microsoft's Patch Tuesday, fallout from an Adobe move last month. Earlier this week, Google updated its Chrome browser, quashing six bugs and as it often does, also updating Adobe's Flash ...
The Information Commissioner's Office is to investigate claims that Tesco's website does not offer sufficient privacy protections to customers. The UK privacy watchdog's probe comes after security experts raised a number of privacy ...
Tags: watchdog, Tesco Website, privacy protections, security problems
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
Two ISACA qualifications have been named as the two highest-paying IT certifications by Foote Partners' IT Skills and Certifications Pay Index (ITSCPI). The certified information security manager (CISM) and certified in risk and ...
Tags: ISACA, IT certifications, CISM, CRISC, IT skills
Adobe on Tuesday announced that it will pair future security updates for its popular Flash Player with Microsoft's Patch Tuesday schedule. At the same time, Adobe issued an update that patched seven critical Flash vulnerabilities, and ...
Tags: Adobe, security updates, popular Flash Player, Microsoft
There has been an unprecedented volume of malicious code and attacks - including many high profile incidents - in the Middle East during 2012. Attacks ranged from those performed by cyber criminals to hacktivists and in some cases ...
Tags: malicious code, malicious attacks, high profile incidents, IT Security