• March 02, 2015 02 Mar'15

    Uber database breach source of stolen driver information

    Following the theft of data affecting about 50,000 of its drivers, Uber says it has filed a subpoena to obtain GitHub data that may pinpoint the source of its data breach.

  • March 02, 2015 02 Mar'15

    New scrutiny on bug bounties: Is there strength in numbers?

    Bug bounty programs are a cool idea and often work, so why haven't they taken off for non-tech companies?

  • March 02, 2015 02 Mar'15

    Is the bug bounty program concept flawed?

    Looking for security vulnerabilities? Tread lightly. The benefits of vulnerability rewards programs are great, but so are the risks.

  • March 02, 2015 02 Mar'15

    US retailer Natural Grocers investigates data breach

    Natural Grocers is the latest US retailer to announce it is investigating a possible data breach involving customer payment cards

  • February 27, 2015 27 Feb'15

    Data breach consequences: Get breached, make money?

    News roundup: Data breaches aren't associated with soaring stock prices, but recent examples show breaches may boost stocks. Plus: Gemalto confirms possibility of GHCQ/NSA hack; Target breach costs company $162 million; Superfish swims on.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • February 26, 2015 26 Feb'15

    HP: Threat intelligence sources need vetting, regression testing

    According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.

  • February 25, 2015 25 Feb'15

    Google Project Zero changes fuel new vulnerability disclosures debate

    Google's Project Zero has added more leeway to its vulnerability disclosure policy, but industry observers are split on whether 90 days is enough time to fix software flaws, or not enough time to manage a sensitive, resource-intensive process.

  • February 25, 2015 25 Feb'15

    3G and 4G phones not affected by NSA and GCHQ hack, says Gemalto

    The world’s largest maker of Sim cards, Gemalto, says it has “reasonable grounds” to believe it was hacked by UK and US spy agencies in 2010 and 2011

  • February 24, 2015 24 Feb'15

    Macro viruses reemerge in Word, Excel files

    Macro viruses haven't been popular since the early 2000s, but recent malware discoveries indicate that macro-infected Word and Excel files are on the rise.

  • February 24, 2015 24 Feb'15

    Business disruption cyber attacks set to spur defence plans, says Gartner

    By 2018, 40% of organisations will have plans to address cyber-security business disruption attacks, up from 0% in 2015, says Gartner

  • February 23, 2015 23 Feb'15

    Slow adoption of DMARC policy leaves email vulnerable, vendor says

    A new study finds that enterprises, especially healthcare companies, are slow to adopt the DMARC email authentication standard, making them vulnerable to malicious emailers.

  • February 23, 2015 23 Feb'15

    Cisco touts OpenAppID for internal application traffic visibility

    Use of Cisco's OpenAppID application-layer traffic-detection tool is still modest compared to Snort, but the networking giant says it can help enterprises improve traffic visibility on internal applications.

  • February 23, 2015 23 Feb'15

    Lenovo faces lawsuit for pre-installing Superfish adware

    A class action lawsuit has been filed against Lenovo after it was found to have pre-installed adware vulnerable to cyber attacks

  • February 20, 2015 20 Feb'15

    Maintaining vendor trust proves tough for Lenovo, Microsoft

    News roundup: Amid hidden add-ons, discontinued services and walled gardens, vendor trust proves elusive for several high-profile tech firms. Plus: Evidence ties North Korea to Sony Pictures hack; card brands boost cybersecurity; and cookies that ...

  • February 20, 2015 20 Feb'15

    Flaws in alternative Android browsers pose underestimated risk

    Exclusive: VerSprite research on 10 alternative Android browsers has found at least one major security vulnerability in all of them, posing a significant security risk for enterprise Android users.