The 15th China Public Security (CPSE) will be hold at Shenzhen Convention and Exhibition center, during 29th Oct. to 1st Nov. The Gold Tripod Award Ceremony, the Global Security Grand Ceremony and the 13th China Public Security ...
Tags: Footprints
Two-thirds of public sector officials feel that security should play a bigger role in the government's Digital by Default reform agenda, according to research by McAfee. The research, conducted in association with specialist political ...
Tags: Computer Products, software
Most financial services organisations (even the largest ones) have admitted that they do not have the budget to deal with the largest cyber attacks, according to attendees of a recent forum. Comments made at Ballintrae's first IT Security ...
Tags: Cyber Attacks, Computer Products
The head of the US National Security Agency (NSA) and Cyber Command, created to defend against internet-based attacks, has called on hackers to help make the web more secure. General Keith Alexander emphasised the common ground between US ...
Tags: hackers, National Security Agency, US, internet-based attacks
MobileIron, a company that specialises in security and management for mobile apps, has introduced a suite of products for enterprise smartphones and tablets. To tackle apps provisioning, the company has developed the MobileIron ...
Tags: MobileIron, mobile apps, smartphones, tablets, Microsoft ActiveSync
Android Forums, an online forum for Android users, was the target of a hacker attack that could have led to user information including passwords getting compromised, its operator Phandroid.com said on Thursday. Members of Android Forums ...
Tags: Android Forums, Android users, online forum, hacker attack
Big data analytics has the potential to reduce the growing number of cyber security risks and increase business agility, says a report by the Information Security Forum (ISF). According to the Data Analytics for Information Security ...
Tags: ISF, big data analytics, cyber security risks, business agility
The IT Security professional is there to ensure that an organisation's information is not compromised,whether you are an acquirer,a target or a party to a merger. From the acquirer's perspective,there are some very simple questions that ...
Tags: Security Think Tank, Essential security questions, MandAs
Cost pressures and the rise of cloud computing have led many businesses to turn to lower-cost virtual environments on premise and in the cloud, but a lack of expertise and experience may be exposing these organisations to unnecessary ...
Tags: cloud computing, virtual server, physical server, physical networks
National Security Agency Director General Keith B. Alexander addressed the attendees of the Defcon hacker conference in Las Vegas on Friday and asked for their help to secure cyberspace. "This is the world's best cybersecurity community," ...
Tags: Cyberwarfare, US, cyberspace security, NSA
Former White House cyber security coordinator Howard Schmidt is to join the board of security and compliance company Qualys. Howard Schmidt announced he was to step down as White House cyber czar in May after two and a half years. Michael ...
Tags: Howard Schmidt, White House, cyber czar, Security Forum