cybersecurity

Image for What the financial services sector needs to know when adopting the cloud securely
Technology

What the financial services sector needs to know when adopting the cloud securely

By Paige Leidig, CipherCloud The financial services industry is increasingly adopting cloud computin...

29th March, 2013

Image for Trusteer’s Senior Security Strategist, George Tubin on endpoint security
Top Stories

Trusteer’s Senior Security Strategist, George Tubin on endpoint security

What is the single most important way to improve endpoint security? According to Gartner’s Neil MacD...

25th March, 2013

Image for A Perfect CRIME? Only TIME Will Tell
Top Stories

A Perfect CRIME? Only TIME Will Tell

Sharing security research and intelligence makes the community as a whole safer. By uncovering and s...

25th March, 2013

Image for Bit9 2013 Server Security Survey Shows Concerns about Targeted Malware Rising
Technology

Bit9 2013 Server Security Survey Shows Concerns about Targeted Malware Rising

1,000 IT and Security Pros Worldwide are Less Confident about Stopping Threats WALTHAM, Mass.—March...

22nd March, 2013

Image for System State Intelligence and the Intrusion Kill Chain
Technology

System State Intelligence and the Intrusion Kill Chain

Dwayne Melancon, Chief Technical Officer, Tripwire Synopsis: In kill chain analysis, an attacker has...

20th March, 2013

Image for Keeping IT GRC simple by getting IT SaaSed!
Technology

Keeping IT GRC simple by getting IT SaaSed!

Organisations big and small need a collaborative approach to compliance, with affordable entry point...

20th March, 2013

Image for The CISO as the Man-in-the-Middle
Technology

The CISO as the Man-in-the-Middle

Michael Thelander, Director of Product Management, Tripwire If you’ve been working in or around the...

20th March, 2013

Image for Combating Cyber-Attacks Against the Financial Community
Technology

Combating Cyber-Attacks Against the Financial Community

How Banks Can Maintain Information Security by Bolstering Internal Controls By Bala Venkatramani &#8...

20th March, 2013

Image for Varonis Says Rise In Hacking Is Due To Lack Of Basic Controls
Top Stories

Varonis Says Rise In Hacking Is Due To Lack Of Basic Controls

London, 14th March 2013 – Commenting on a Wall Street Journal report that the top US spies have warn...

19th March, 2013

Image for The fake CEO – Kroll reveals the latest tricks used by fraudsters
Business

The fake CEO – Kroll reveals the latest tricks used by fraudsters

When a company is hit by fraud, more often than not, it’s an inside job. A typical internal fraudste...

19th March, 2013

Image for SOURCEFIRE INTRODUCES DEDICATED ADVANCED MALWARE PROTECTION APPLIANCE
Technology

SOURCEFIRE INTRODUCES DEDICATED ADVANCED MALWARE PROTECTION APPLIANCE

25 February 2013 Continuous Analysis and Retrospective Security Address Malware Across the Entire At...

27th February, 2013

Image for Are data breaches inevitable in a digital age?
Business

Are data breaches inevitable in a digital age?

Christian Toon, Head of Information Risk, Global Security Services, Iron Mountain With 93 per cent o...

27th February, 2013