A British government security group said Wednesday that it hasn't yet evaluated the security of BlackBerry 10 devices such as the Z10. The UK Communications-Electronics Security Group (CESG) statement was issued following a report Tuesday ...
Tags: British Government, Blackberry
Both BlackBerry and the U.K. government have denied reports that the new BB10 software has been rejected for use in sensitive government communications. Tuesday evening, U.K. newspaper The Guardian reported that the new BB10 operating ...
Eng. Omar Abdullah Al Nomany, Vice President of IT, STC Saudi Arabian STC this week inaugurated what it calls the largest information security control centre in the region to improve the security features of the telco’s systems and ...
Tags: STC, Security Operations Centre, IT
Tripwire today said it had acquired nCircle for an undisclosed price, a deal that will meld together two longtime rivals in the security and vulnerability-management industry. Tripwire, which had been acquired by investment firm Thoma ...
Tags: Security vulnerability, nCircle, Network
The Office of Information Technology at the U.S. Department of Veterans Affairs has disputed a finding by the agency's Inspector General that several VA centers routinely transmit unencrypted sensitive personal data over the public ...
Tags: Office of Information Technology, Veterans Affairs, public Internet
The Cyber Security Challenge, a series of national events designed to encourage talented professionals to join the UK IT security industry, has just announced its latest winner, 28-year-old chemist Stephen Miller. Government cyber ...
Tags: Cyber Security Challenge, IT security industry, cyber security
Demand for information security experts in the United States is outstripping the available supply by a widening margin, according to a pair of recently released reports. A report from Burning Glass Technologies, which develops ...
Tags: information security, Burning Glass Technologies, cybersecurity
Research teams Wednesday cracked Microsoft's Internet Explorer 10 (IE10), Google's Chrome and Mozilla's Firefox at the Pwn2Own hacking contest, pulling in more than $250,000 in prizes. Earlier in the day, a solo hacker exploited Oracle's ...
Tags: Microsoft, Oracle's Java, explorer
According to a pair of recently released reports, demand for information security experts in the United States is outstripping the available supply by a widening margin. A report from Burning Glass Technologies, which develops ...
Tags: information security experts, United States, widening margin
WatchGuard Technologies has announced the upcoming availability of seven new models in its line of extensible threat management (XTM) products. It will also release the Fireware XTM 11.7, a software update for its XTM suite of network ...
Tags: Computer Products, Computer, WatchGuard
Some thousand-plus Google users have been subject to FBI security information requests since 2009, the company said Tuesday. The data build on Google's already existing tally of government data requests. The new figures look at the number ...
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Over the past few years, the ...
Rights advocacy groups and security practitioners remain on opposite ends of the spectrum on the merits of sharing information as a means to improve cyber security. The Electronic Frontier Foundation, the Center for Democracy and ...
Tags: rights advocacy, sharing information, Electronic Frontier Foundation
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts. Over the past few years, the security strategies of many companies and ...
Tags: IT security strategies, emerging cyber threats, security strategies
Applying big data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held ...
Tags: information security, RSA Conference 2013, data aggregation