Security
11 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Judy Schramm
Scoop.it!

How Was Your Year In Security? | SecurityWeek.Com

How Was Your Year In Security? | SecurityWeek.Com | Security | Scoop.it
Network security, like every other arena, can benefit from taking a step back to consider what we’ve done, where we’re going, and what we should try to do differently. (RT @SecurityWeek: How Have You Done at Securing Your Network this Year?
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

herdProtect is a promising cloud-based malware scanner for Windows

herdProtect is a promising cloud-based malware scanner for Windows | Security | Scoop.it
Ever since cloud became a buzzword many security companies started to make use of it in their pro...
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Enterprise Security Professionals Offer Their Mobile Computing Security Advice - Network World

Enterprise Security Professionals Offer Their Mobile Computing Security Advice Network World Aside from these risk/threat assessments, CISOs should also make sure that they have at least one person on staff that really knows what's happening in the...
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

The Year Ahead In Cyber Security: What You Need To Know - Forbes

The Year Ahead In Cyber Security: What You Need To Know - Forbes | Security | Scoop.it
The Year Ahead In Cyber Security: What You Need To Know
Forbes
2013 was a watershed year for cyber security and digital secret-keeping.
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Businesses Overconfident About IT Security - Channel Partners

Businesses Overconfident About IT Security - Channel Partners | Security | Scoop.it
Businesses Overconfident About IT Security
Channel Partners
Businesses in a new survey feel pretty good about their readiness to combat threats despite not having made significant changes to how they approach IT security in recent years.
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

How your compiler may be compromising application security - ITworld.com

How your compiler may be compromising application security - ITworld.com | Security | Scoop.it
ITworld.com
How your compiler may be compromising application security
ITworld.com
The idea is that it will warn programmers about unstable code in their applications, so they can fix it, rather than have the compiler simply leave it out.
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Firm predicts 2014's "most dangerous" malware trends - SC Magazine

Firm predicts 2014's "most dangerous" malware trends - SC Magazine | Security | Scoop.it
Firm predicts 2014's "most dangerous" malware trends SC Magazine Threats that made the list were: source code leaks, which continue to hasten malware release cycles; saboteurs using “old school” techniques to bypass newer detection technologies;...
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Beware of malware disguised as security patch - GMA News

Beware of malware disguised as security patch - GMA News | Security | Scoop.it
Help Net Security
Beware of malware disguised as security patch
GMA News
If a security software patch from a reputable antivirus company for your computer comes as an email attachment, be suspicious – it could be a nasty piece of malware in disguise.
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

The state of IT security in 2013 - Computer Business Review (blog)

The state of IT security in 2013 - Computer Business Review (blog) | Security | Scoop.it
The state of IT security in 2013
Computer Business Review (blog)
Here's a great infographic that shows the main geographical hotspots for IT infections, along with the most prolific malware attacks and mobile devices targeted.
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Dexter Malware, the rise of malware that hits point of sales

Dexter Malware, the rise of malware that hits point of sales | Security | Scoop.it
Security experts at Arbor Networks have found a couple of servers used to arrange a malicous campaign against PoS with Dexter malware.
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Security predictions 2014: Uptick in mobile malware - mHealthNews

Security predictions 2014: Uptick in mobile malware - mHealthNews | Security | Scoop.it
Security predictions 2014: Uptick in mobile malware
mHealthNews
Kevin Johnson, a self-described "ethical hacker" and chief executive officer at network security firm Secure Ideas, also cautioned against BYOD in hospitals.
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Predictions for 2014 - David Lacey's IT Security Blog

So what will 2014 hold for cyber security professionals? Will it be something new or more of the old? The answer is bit of both. We have all reached a crossroads in the way we manage security. Some CSOs will soldier on ...
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Why Network Security is the Foundation for Cyber Strategy - CIO

Why Network Security is the Foundation for Cyber Strategy - CIO | Security | Scoop.it
Why Network Security is the Foundation for Cyber Strategy CIO While most organizations fear the security risks associated with mobile devices, the fact is that most malware attacks on networks occur through legitimate users visiting legitimate...
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

100 Security Experts to Follow on Twitter - Marble Security

100 Security Experts to Follow on Twitter - Marble Security | Security | Scoop.it
… Continued (A top 100 security list without @hdmoore on it isn’t a good list =) http://t.co/NLz4Akbg2q - still kudos to all.)
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Securing The Software-Defined Network - InformationWeek

Securing The Software-Defined Network - InformationWeek | Security | Scoop.it
Securing The Software-Defined Network
InformationWeek
With the emergence of software-defined networks (SDNs), security must become a core component of the network.
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Your startup may have a security plan, but is it enough?

Your startup may have a security plan, but is it enough? | Security | Scoop.it
Security is an ever-present constant for any business, and in spite of the fact that it is often underrated, it has the capacity to present a relentless danger to an organisation whether the threat...
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Innovations that will shape network security - Help Net Security

Innovations that will shape network security - Help Net Security | Security | Scoop.it
Innovations that will shape network security
Help Net Security
Headline after headline, some company reports a cyber incident and hangs its head in shame.
more...
No comment yet.
Scooped by Judy Schramm
Scoop.it!

Why cloud security requires multiple layers - USA TODAY

Why cloud security requires multiple layers - USA TODAY | Security | Scoop.it
Why cloud security requires multiple layers USA TODAY (Editor's note: In this guest essay, Rajiv Gupta, founder and CEO of Skyhigh Networks, explains why layers of security are vital to protecting Internet cloud services.) The digital universe...
more...
No comment yet.