• February 25, 2015 25 Feb'15

    Google Project Zero changes fuel new vulnerability disclosures debate

    Google's Project Zero has added more leeway to its vulnerability disclosure policy, but industry observers are split on whether 90 days is enough time to fix software flaws, or not enough time to manage a sensitive, resource-intensive process.

  • February 25, 2015 25 Feb'15

    3G and 4G phones not affected by NSA and GCHQ hack, says Gemalto

    The world’s largest maker of Sim cards, Gemalto, says it has “reasonable grounds” to believe it was hacked by UK and US spy agencies in 2010 and 2011

  • February 24, 2015 24 Feb'15

    Macro viruses reemerge in Word, Excel files

    Macro viruses haven't been popular since the early 2000s, but recent malware discoveries indicate that macro-infected Word and Excel files are on the rise.

  • February 24, 2015 24 Feb'15

    Business disruption cyber attacks set to spur defence plans, says Gartner

    By 2018, 40% of organisations will have plans to address cyber-security business disruption attacks, up from 0% in 2015, says Gartner

  • February 23, 2015 23 Feb'15

    Slow adoption of DMARC policy leaves email vulnerable, vendor says

    A new study finds that enterprises, especially healthcare companies, are slow to adopt the DMARC email authentication standard, making them vulnerable to malicious emailers.

  • Sponsored News

    • RAND Model Quantifies Staying Power of Security Technologies

      When you estimate the ROI of a new security technology, you usually assume that it will provide the same value year after year. But the RAND Corporation has developed a sophisticated new model of the costs and benefits of cybersecurity which has produced a surprising result. See More

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Top 4 Reasons Why Security and Networking Are Coming Together

      Until recently cybersecurity and networking could be treated as separate domains, with different devices, different management tools and different staffs. But that approach won’t fly today. This paper discusses why security needs to be integrated into networking equipment, monitoring and management. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    View All Sponsored News
  • February 23, 2015 23 Feb'15

    Cisco touts OpenAppID for internal application traffic visibility

    Use of Cisco's OpenAppID application-layer traffic-detection tool is still modest compared to Snort, but the networking giant says it can help enterprises improve traffic visibility on internal applications.

  • February 23, 2015 23 Feb'15

    Lenovo faces lawsuit for pre-installing Superfish adware

    A class action lawsuit has been filed against Lenovo after it was found to have pre-installed adware vulnerable to cyber attacks

  • February 20, 2015 20 Feb'15

    Maintaining vendor trust proves tough for Lenovo, Microsoft

    News roundup: Amid hidden add-ons, discontinued services and walled gardens, vendor trust proves elusive for several high-profile tech firms. Plus: Evidence ties North Korea to Sony Pictures hack; card brands boost cybersecurity; and cookies that ...

  • February 20, 2015 20 Feb'15

    Flaws in alternative Android browsers pose underestimated risk

    Exclusive: VerSprite research on 10 alternative Android browsers has found at least one major security vulnerability in all of them, posing a significant security risk for enterprise Android users.

  • February 20, 2015 20 Feb'15

    Gemalto denies knowledge of GCHQ and NSA Sim card hack

    Gemalto says it cannot verify a report that it was hacked by the NSA and GCHQ to steal encryption keys

  • February 18, 2015 18 Feb'15

    Password reuse and password sharing prevalent in enterprises

    The high percentage of password reuse and sharing by employees leaves enterprises vulnerable to breaches, according to a recent survey from SailPoint Technologies.

  • February 17, 2015 17 Feb'15

    UTM vs. NGFW: Unique products or advertising semantics?

    In comparing UTM vs. NGFW, organizations find it difficult to see if there are differences between the two products or if it is just marketing semantics.

  • February 17, 2015 17 Feb'15

    International spyware operation linked to NSA

    The US National Security Agency has reportedly hidden surveillance software in the hard drives of several top computer makers

  • February 13, 2015 13 Feb'15

    Security information sharing: A double-edged sword

    News roundup: While data sharing can boost intelligence and improve security, recent events show the benefits don't always outweigh the pitfalls. Plus: Chip-enabled POS systems coming quickly; MongoDB databases exposed; sophisticated phishing scams.

  • February 12, 2015 12 Feb'15

    Report: Firewall policy management is a hot mess

    A new report from FireMon finds that firewalls are still a critical security component, but firewall policy management is a major pain point for admins.