Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security

You are using the plain HTML view, switch to advanced view for a more complete experience.

New infosec products of the week​: December 9, 2016
Thales releases advanced encryption solutions for secure docker containers Thales released new capabilities for its Vormetric Data Security Platform. These advances extend data-at-rest security capabilities with integrated Docker encryption and access controls, the ability to encrypt and rekey data without having to take applications offline, FIPS certified remote administration and management of data security policies and protections, and the ability to accelerate the deployment of tokenization, static data masking and application encryption. Unisys Stealth(aware) automates … More
CISOs must assess risks and identify the real security budget
Organizations spend an average of 5.6 percent of the overall IT budget on IT security and risk management, according to Gartner. However, IT security spending ranges from approximately 1 percent to 13 percent of the IT budget and is potentially a misleading indicator of program success, analysts said. “Clients want to know if what they are spending on information security is equivalent to others in their industry, geography and size of business in order to … More
80% of digital publishers don’t know how their web traffic is audited
The burden of proof is on publishers to defend their web traffic, yet 80 percent admit they don’t have insight into how their traffic is audited, raising questions about which traffic is non-human traffic (NHT). Marketers are no longer willing to pay for NHT, with 74 percent of publishers reporting that traffic quality issues are part of pre-sales discussions, and 68 percent stating they have received requests for information (RFIs) with acceptable NHT thresholds. This … More
Six tips for practicing safe social media
With Facebook now counting over 1.7 billion monthly users and LinkedIn another 467 million, it was only a matter of time until criminal hackers turned their attention to exploiting social media as an attack vector. The current attack is being waged to introduce ransomware into these environments. Dubbed “Imagegate”, it’s a clever way of sneaking malware into your environment. It typically runs this way: While on Facebook, a user sees an Instant Message. It appears … More
Exploring data security in the legal sector and beyond
BitSight analyzed the Security Ratings of more than 20,000 organizations in six industries – Finance, Legal, Healthcare, Retail, Government and Energy. The objective was to highlight quantifiable differences in security performance across industries from the past 12 months and identify areas of cybersecurity risks. “Legal service providers have access to a company’s intellectual property, financials, strategic plans, and private employee information. In addition, law firms are one of the most widely-used third party service providers … More
Bugtraq: AST-2016-008: Crash on SDP offer or answer from endpoint using Opus
AST-2016-008: Crash on SDP offer or answer from endpoint using Opus
Bugtraq: AST-2016-009:
AST-2016-009: <br>
Bugtraq: Symantec VIP Access Desktop Arbitrary DLL Execution
Symantec VIP Access Desktop Arbitrary DLL Execution
UK.gov state of the nation report: Infosec's very important, mmmkay

Gov Secure Internet to be revamped, world still on brink of digital destruction, etc etc

The UK government’s first annual report on the implementation of the 2015 National Security Strategy has reaffirmed that cyber-security remains a key priority.…

UK.gov state of the nation report: Infosec's very important, mmmkay

Gov Secure Internet to be revamped, world still on brink of digital destruction, etc etc

The UK government’s first annual report on the implementation of the 2015 National Security Strategy has reaffirmed that cyber-security remains a key priority.…

Post Selected Items to:

Showing 10 items of about 9100

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner PRNews.io •   © 1999-2016 NewsKnowledge