Security

Subscribe Archives >
 

Pressure to Roll Out New Tech Grows, Despite Risks

2 days ago | by Samuel Greengard

For IT and business leaders, the pressure to unveil new and updated technologies, systems and apps—while securing existing infrastructure—is overwhelming. Security concerns and risks seem... Read More

 
 
 
 
 
 

LATEST STORIES

  • Cyber-Security Teams: No Rest for the Wary
     
    Today's IT security teams face a constant and evolving barrage of threats that force them to assess their security policies and procedures on an ongoing basis.
     
    READ MORE
     
  • How Can We Put a Price on Security?
     
    When everything, including security, is only about dollar costs and squeezing out maximum profits, we are headed down a dangerous and disturbing path.
     
    READ MORE
     
  • Vulnerabilities in Mobile Apps Worry Security Pros
     
    As technology continues its breakneck pace of change, the threats keep evolving. Vulnerabilities in mobile applications are being increasingly exploited, and the Angler exploit kit is picking up where Blacole left off. In addition, the increasingly...
     
    READ MORE
     
  • New Ransomware Attacks Could Surface This Year
     
    A security threat report warns that new ransomware types have developed and are being distributed through email spam, malvertising and watering hole attacks.
     
    READ MORE
     
  • It's Time to Raise the Profile of Security
     
    Has information security outgrown IT? According to a report from HP, it's possible. The size, scope, severity and frequency of cyber-attacks have raised the profile of security teams to a new level, as evidenced by recent attacks against the likes...
     
    READ MORE
     
  • IT Security Is Not Keeping Pace With Threats
     
    The old saying "Fool me once, shame on you; fool me twice, shame on me" is taking on new life in the world of information security. Amid a constant flow of high-profile security breaches—and despite plenty of firsthand experience and...
     
    READ MORE
     
  • Conflicts, Trends & Ethical Challenges of Privacy
     
    The intensifying debate over digital privacy demonstrates the vast complexities of this issue. On one hand, users appreciate the advantages of having one-on-one purchasing experiences with companies. That's how, through alerts and other techniques,...
     
    READ MORE
     
  • National Lab Tests Network Fingerprinting System
     
    The Savannah River National Lab is turning to network fingerprinting technology to detect changes in power consumption that can indicate a security breach.
     
    READ MORE
     
  • Managing Security in Today's App Economy
     
    Cyber-security has emerged as a major challenge for businesses large and small. It increasingly impacts e-commerce, data management, employee collaboration, and a variety of other tasks and processes. In the end, it affects company growth and...
     
    READ MORE
     
  • Half Work and Half Play Makes Jack a Security Risk
     
    It's probably time to rethink this whole notion of work-life balance. With huge numbers of workers saying that they're using their work devices for personal business and using their personal devices to do work, the line between work and personal...
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters



















 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date