As the end of the year approaches, and enterprises around the world begin to plan for the year to come, Verizon’s annual view on enterprise-technology trends offers a timely reminder of what’s shaping the technology market from the...
Here's what you can do to stay safe online for National Cyber Security Awareness Month in October, and all year long (from the National Cyber Security Alliance and Stop. Think. Connect.)
Via HE Info Sec Council
Compliance and security vulnerabilities are top concerns for POS systems Help Net Security Without adequate controls to manage store systems and the increase in number and variety of devices – retailers can expect security costs to continue to...
We asked ZDNet readers how much free reign their businesses allow their employees, and the results found that not only do senior staffers generally have access to whatever corporate data they like while on the go, there isn't a security policy in...
People present the greatest cyber vulnerability and educating them is key to protecting your valuable information, John K. Mullen, senior operations officer at the CIA told the audience at 2013 SINET Innovation Summit in New York, August 6th 2013.
Computerworld Singapore covers a wide range of technology topics, including software, security, operating systems, mobile, storage, servers and data centers, and technology companies such as Microsoft, Google and Apple.
Amit Yoran, SVP, Unified Products, RSA, The Security Division of EMC Our customers are industry leaders in advancing risk management and compliance program objectives, and we have had the benefit of being deeply involved in their program maturity.
“ Gartner's vision of infosec 2019: four scenarios, all bad CSO Magazine Will it be the total surveillance society and internet licenses? A breakdown of authority, with e-militias fighting extreme anarcho-hactivists?”
Businesses coping with security issues stemming from employee use of personal devices for company work are only experiencing what universities have grappled with for years. Many of us in higher ed find it very funny when we see how BYOD has dominated so much of the security press lately," Mike Corn, chief privacy and security officer at the University of Illinois (UI) at Urbana-Champaign, said in an interview. "We view that with amusement because Bring Your Own Device has defined our environment almost since the beginning of personal computing. The magnitude of BYOD at a university the size of UI would likely give a corporate security administrator fits. Not only is there a large annual turnover rate -- some 10,000 new students arrive on campus each year -- but each has an average of 3.5 personal devices in tow.
Via HE Info Sec Council
Malware and internet-based attacks continue to escalate in both volume and complexity, but when it comes to web application security, critical-level risk appears to be in the minority thanks to the convoluted code that most apps run on.
Computerworld Malaysia covers a wide range of technology topics, including software, security, operating systems, mobile, storage, servers and data centers, and technology companies such as Microsoft, Google and Apple.