Cybersecurity Government and Private Sector Data Sharing Heats Up into 2016
There has been a lot of talk about the need for improved cybersecurity information sharing ...
Chip and PIN Finally Arrives in the U.S., but Uncertainties Remain for Payment Security
The first U.S. holiday season with chip and PIN technology in place is freshly behind us. ...
Lack of business skills forms main barrier to global expansion for tech startups, Bitdefender founder says
High-tech start-ups aiming to expand globally usually face one main, immediate barrier - the ...
Tackling Cybercrime with the Legislation Unicorn
In light of recent terrorist and cyber-terrorist attacks, European states have more ...
eBay XSS Flaw: How Websites Might Help Criminals Phish Customers’ Passwords
It’s 2016, and it would be nice to think that after several years of doing business online, ...
CIO’s agenda in 2016: Spend more on security to stop data leaks
More than half of C-level managers define the prevention of data leaks as the main priority ...
"Unauthorised code" on Juniper firewalls gives attackers admin access, decrypts VPN traffic
With many companies shutting down for the holidays, chances are that the IT team at your ...
Are employees’ smartphones putting your business at risk?
The shift toward using personal computing devices (laptops, tablets, smartphones and now ...
Study Shows that Organizations are Putting More Money, Senior Management Focus into Cyber Security
The latest “State of Information Security Survey” from consulting firm PcW sheds some new ...
Predictions for 2016: Mac Ransomware. Public Shaming. Blitzkrieg Attacks on Companies
With a turbulent 2015 and a 15-year-history of fighting malware as a guide, here is what ...
Worst-case scenario: state-sponsored attackers hack your company
CIOs and CISOs face each day the fear of internal and external threats from criminal ...
Shadow IT Isn't A Disease--It's A Symptom Of Irrelevance
Shadow IT. Just the name runs little shivers up the spines of IT executives—they like to ...


