SECURITY2talk
Follow
Find
42 views | +0 today
SECURITY2talk
IT security
Curated by semigb
Your new post is loading...
Your new post is loading...
Scooped by semigb
Scoop.it!

IT security managers concerned about the security of BYOD - ihotdesk - IT News

IT security managers concerned about the security of BYOD - ihotdesk - IT News | SECURITY2talk | Scoop.it
Help Net Security IT security managers concerned about the security of BYOD ihotdesk - IT News IT security managers believe that companies have to do more to understand the possible security implications of allowing their staff to work using their...
more...
No comment yet.
Scooped by semigb
Scoop.it!

Upper Management Often Ignores IT Security Policy - Spiceworks

Over the years I have had a nagging suspicion that only today was confirmed. I ran into a study done last year done by a company call... | 7 replies | Security.
more...
No comment yet.
Scooped by semigb
Scoop.it!

Revealed: Most popular IT security suppliers - ComputerWeekly.com (blog)

Revealed: Most popular IT security suppliers - ComputerWeekly.com (blog) | SECURITY2talk | Scoop.it
Revealed: Most popular IT security suppliers
ComputerWeekly.com (blog)
Businesses are opting to work with large IT suppliers that can meet a range of business needs in preference to niche security suppliers.
more...
No comment yet.
Scooped by semigb
Scoop.it!

Businesses finally see ROI for IT security - ComputerWeekly.com

Businesses finally see ROI for IT security - ComputerWeekly.com | SECURITY2talk | Scoop.it
Businesses finally see ROI for IT security
ComputerWeekly.com
More than 100 IT professionals who use SAP software and are involved in security and control activities were polled by Turnkey Consulting, a specialist GRC and IT security company.
more...
No comment yet.
Scooped by semigb
Scoop.it!

Google wants to change security from passwords to keys and 'smart rings' | Digital Trends

Google wants to change security from passwords to keys and 'smart rings' | Digital Trends | SECURITY2talk | Scoop.it
Nobody likes trying to remember a dozen different passwords, but would you trust your personal information to a tiny USB key? Google is hoping yes.
more...
No comment yet.
Scooped by semigb
Scoop.it!

Big Data Will Transform IT Security, Says RSA | SecurityWeek.Com

Big Data Will Transform IT Security, Says RSA | SecurityWeek.Com | SECURITY2talk | Scoop.it
Companies should be thinking about setting up a centralized warehouse where all security-related data is captured, indexed, normalized, analyzed, and shared.
more...
No comment yet.
Scooped by semigb
Scoop.it!

Security Through Obscurity as an IT Security Technique: The Benefits

Security Through Obscurity as an IT Security Technique: The Benefits | SECURITY2talk | Scoop.it
Last year InfoWorld columnist Roger A. Grimes put out a great post that advised security-through-obscurity as an interesting suggestion in his Top 10 list titled “10 Crazy IT Security Tricks that A...
more...
No comment yet.
Scooped by semigb
Scoop.it!

IT Security Daily

IT Security Daily | SECURITY2talk | Scoop.it
IT Security Daily, by sachin: updated automatically with a curated selection of articles, blog posts, videos and photos. (IT Security Daily is out!
more...
No comment yet.
Scooped by semigb
Scoop.it!

Survey: UK bosses lax on IT security - DigitalIDNews (blog)

Survey: UK bosses lax on IT security - DigitalIDNews (blog) | SECURITY2talk | Scoop.it
Survey: UK bosses lax on IT security
DigitalIDNews (blog)
Fifty-one percent of UK bosses are “unconcerned” with the security of their corporate networks, according to a report released by authentication provider, Swivel Secure.
more...
No comment yet.
Scooped by semigb
Scoop.it!

'Red October' Attacks: The New Face Of Cyberespionage - Dark Reading

'Red October' Attacks: The New Face Of Cyberespionage - Dark Reading | SECURITY2talk | Scoop.it
New cyberspying attacks discovered siphoning terabytes of information from computers, smartphones, routers and even VoIP phones
more...
No comment yet.