Personally identifiable information of "at least" 10,000 NASA employees and contractors remains at risk of compromise following last month's theft of an agency laptop, a spokesman told Computerworld via email Thursday. Agency employees ...
Tags: US, computer security, IT industry, NASA
IDG News Service - A deeper look into the Flame malware, linked to the infamous Stuxnet, has revealed that it may be just one of four pieces of malware created by the same unknown development team. Flame became public in May after Iran ...
Tags: Flame malware, virus, malware, cyber security
IDG News Service - Prince George's Community College in Maryland will use a $5 million grant from the U.S. National Science Foundation to address a major concern in cybersecurity circles, that the U.S. isn't producing enough qualified ...
CIO - When it comes to securing business-technology systems, CIOs face a challenge that won't go away. The problem isn't necessarily new attack techniques, insecure software or even the latest government regulations. Rather, it's the ...
Tags: CIOs, CSOs, business technology systems, techniques, software
Leading global configure, price, quote (CPQ) system chosen by online IT infrastructure provider to streamline sales processes worldwide. Cameleon CPQ chosen to make the sales and customer experience better and more efficient. Cameleon ...
Tags: Cameleon Software, Software, PEER 1, Sales Operations
Leading French mutual insurance company with more than 3 million members chooses Cameleon Software for its offers management system. Cameleon Software, announced today that the MGEN Group, the leading French mutual insurance company for ...
Tags: Cameleon Software, Software, MGEN Group
IT Governance Ltd, the PCI and information security experts, are advising organisations which must comply with the PCI DSS requirements, that successful implementation of the standard can only be achieved through well trained staff. The ...
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
The proper management of information security is one of the most important things that public organizations and private businesses should think of as the security of the company data is a major issue. The proper management of the ...
Tags: IT Security, Computer Products, Siscon
An enduring disconnect between information management and infosecurity plagues corporate organizations,say data management experts. This has been a recurrent theme of SearchDataManagementUK interviews with people familiar with the state ...
Tags: data management, infosecurity
A data breach at Essex County Council, which has exposed up to 400 vulnerable people to identity theft, is to be investigated by the Information Commissioner's Office (ICO). The security lapse, by a council employee, involved the names, ...
Tags: ICO, Essex County Council, investigation, computing
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
Over half of CIOs fail to test cloud vendors' security systems and procedures before selecting the provider, according to a survey of 250 senior IT decision-makers. The research, conducted by IT recruitment consultancy Robert Half ...
Tags: CIO, cloud vendors, security, UK
Cameleon Software, Europe's leading provider of configure - price - quote - software (CPQ) and product configuration software, announces record quarter with 41% year over year growth. CHICAGO, IL, July 12, 2012 /24-7PressRelease/ -- ...
Chief information security officers (CISOs) have an important role in moving their organisations, whether they are public or private, to a cloud computing environment, according to professional certification body (ISC)2. The move is ...
Tags: cloud computing, Chief information security officers, software, computer