Quantcast
Channel: Media and Vendor Sponsors
Browsing all 15 articles
Browse latest View live

Trojans cause 80% of worldwide malware infections (Info Security Magazine)

When it comes to malware, the spawning rate of new threats does not appear to be slowing down at all: In the first quarter of 2013 alone, more than six and a half million new malware samples were...

View Article



Medical identity theft to be explored at FTC hearing (SC Magazine)

The Federal Trade Commission next week will host a hearing examining identity theft affecting senior citizens, and a portion of the discussion will focus on the the rising rates and awareness of...

View Article

Sweet Password Security Strategy: Honeywords (Information Week)

To improve detection of database breaches, businesses should store multiple fake passwords and monitor attempts to use them, according to researchers at security firm RSA....

View Article

IT’S NOT JUST ABOUT CHINA AND AMERICA—SMALLER COUNTRIES WANT TO WAGE CYBERWAR...

America's Department of Defense yesterday released its annual report on China’s military capabilities. The report includes “electronic warfare” and “information dominance” as part of a larger campaign...

View Article

US Department of Defense fingers China as top cyber threat (The Register)

Chinese gov't, military to blame for past attacks http://www.theregister.co.uk/2013/05/07/us_dod_china_warfare_report/

View Article


10 Reasons SQL Injection Still Works (Dark Reading)

After all of these years, SQL injection vulnerabilities still stand as an old reliable for attackers seeking to break into corporate databases....

View Article

Data breaches loom in the face of business transformation (Info Security)

The move to cloud applications, ever-present mobility, Big Data and an escalating set of complex cyber-attack vectors and malware are all conspiring to overwhelm security professionals, leaving the...

View Article

Senators introduce bill that would flag countries, products that benefit from...

A group of senators has responded to the widely broadcast threat of foreign cyber espionage with the introduction of new legislation that calls for the creation of a "watch list" of countries believed...

View Article


Will 'Direct' Exchange Doom HIEs? (Healthcare Info Security)

Sizing Up the Impact of Secure Messaging Protocol http://www.healthcareinfosecurity.com/will-direct-exchange-doom-hies-a-5752

View Article


Big Data Alchemy: Turn Info Into Money (Information Week)

Data markets could become a new market category. Here, companies buy, sell or trade data for mutual benefit....

View Article

Dealing with BYOD Security Risks (Redmond Magazine)

IT is now challenged with implementing personal device security procedures that keeps networks safe from infection and protects data from being lost or stolen....

View Article

Too much infosec regulation undermines security, warns NAB (The Register)

Encouraging compliance discourages responses http://www.theregister.co.uk/2013/05/14/nab_warning_infosec_regulation/

View Article

Should IT Security Be Professionalized? (Careers Info Security)

Panel Addresses Issues in Defining Cybersecurity http://www.careersinfosecurity.com/should-security-be-professionalized-a-5754

View Article


Using Big Data to Predict Attacks (Bank Info Security)

How Data Analysis Speeds Detection, Response http://www.bankinfosecurity.com/using-big-data-to-predict-attacks-a-5760

View Article

Web Application Testing Using Real-World Attacks (Dark Reading)

Using exploits to test Web applications can be an enlightening way to test for vulnerabilities, but there are downsides as well....

View Article

Browsing all 15 articles
Browse latest View live




Latest Images