Security

Subscribe Archives >
 

National Lab Tests Network Fingerprinting System

11 hours ago | by Samuel Greengard

The Savannah River National Lab is turning to network fingerprinting technology to detect changes in power consumption that can indicate a security breach. Read More

 
 
 
 
 
 

LATEST STORIES

  • Credit Bureau Makes the Cloud Its Business
     
    The Caribbean Credit Bureau,  a leading provider of credit services in the Caribbean region, turns to a cloud solution to ring up business and IT gains.
     
    READ MORE
     
  • Is Shadow IT Holding Back Cloud Adoption?
     
    It's hard to secure what you don't know is there. A recent survey from the Cloud Security Alliance indicates that while organizations are clearly concerned about the security of data residing in cloud services, they also have surprisingly little...
     
    READ MORE
     
  • Rep. Will Hurd on Cyber-security & Civil Liberties
     
    The congressman, who heads the new House Information Technology Subcommittee, talks about cyber-security and how business and government can protect themselves.
     
    READ MORE
     
  • A Dating App May Break Your Heart—or Your Firm's
     
    Nearly half of organizations surveyed have at least one worker-installed dating app on mobile devices that are used to access confidential business information.
     
    READ MORE
     
  • Much of Security Software Is Underutilized
     
    One reason security software is not used to the fullest extent is that IT doesn't have the time or staff required to implement software solutions properly.
     
    READ MORE
     
  • Governance Is Key to Quelling Device & Data Sprawl
     
    In an era of device and data sprawl, concerns around IT governance are building. A recent survey from Forrester Research, commissioned by data governance vendor Druva, suggests that organizations will increase their focus on governance over the next...
     
    READ MORE
     
  • Fake Is the New Real
     
    Spammers routinely impersonate users to disseminate malware or misinformation. Without checking every time, it's easy to fall prey to phishing or Web scams.
     
    READ MORE
     
  • IT Security Pros Are Ready to Fight Cyber-Threats
     
    The IT security landscape in 2015 is setting up to be a study in contrasts: Confidence is high among security professionals, even though they expect to be victimized by more attacks, and, as a result, they are planning to significantly beef up their...
     
    READ MORE
     
  • Mobile Devices Ratchet Up Security Risks
     
    Over the last few years, mobility has radically redefined enterprise IT. It has introduced new requirements, new demands, and the need for entirely new technology platforms and connection points. A recent report from Check Point Software...
     
    READ MORE
     
  • Protecting Digital Identities and Devices
     
    Over the last few years, news about data breaches and breakdowns has reached pandemic levels. In many instances, the culprit is the ubiquitous password, which is increasingly ineffective in protecting digital identities and securing digital devices....
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters



















 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date