Search Results:
1-15 of 3129 results

Gov.uk Verify users cannot confirm identities

Gov's identity assurance scheme encounters issues within days of test launch.

Malware

Published 31 October 2014

‘Find My Mobile' feature makes Samsung phones easy to hack

Experts at NIST have advised users to turn off the feature.

Security

Published 29 October 2014

Twitter stocks fall with user engagement

Rival social network Facebook to post earnings changes to advert model.

The Boardroom

Published 28 October 2014

A quarter of Americans hit with online fraud

42% of Americans reported weekly and even daily efforts by hackers

Security

Published 27 October 2014

US hacker jailed for $15m security fraud scheme

The hacker was a part of an international racket.

Security

Published 27 October 2014

Hackers exploit Ebola scare to spread malware

The malicious e mail contains DarkComet Remote Access Trojan virus.

Security

Published 24 October 2014

Adobe starts encrypting Digital Editions 4 user data

The company said it does not share user information.

Security

Published 24 October 2014

What happens to your data once it’s been stolen?

Patrick Petersen, CEO at Agari, looks in to the black market for data.

Published 24 October 2014

SAS targets cyber breach victims

Analytics firm claims it has the tools to help companies prevent and react to data breaches.

Malware

Published 23 October 2014

Alert Logic opens UK Security Operations Centre

Enterprise-grade service for the company's suite of network, system and application security technologies.

Security

Published 22 October 2014

5 Internet of Things home hacks

Following news that Spanish researchers exposed flaws in power smart meters we look at other examples of IOT hacks on the home front

Malware

Published 17 October 2014

Facebook ups bug finding reward

The bug bounty doubles.

Social

Published 17 October 2014

Are companies using too many security tools?

McAfee survey raises threat concerns over integration in cybersecurity.

Security

Published 17 October 2014

Drupal patches SQL injection bug

Flaw takes advantage of query sanitiser designed to prevent code execution.

Security

Published 17 October 2014

FBI warns US businesses of Chinese hackers

Cyber espionage actors routinely stealing data

Security

Published 16 October 2014

1-15 of 3129 results

Join our network

755 people like this.
0 people follow this.

CBR Supplier Recommendations

  • Qualys - IT security risk and compliance solutions

    Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organisations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly secure and within regulatory compliance....

See more

CBR White Paper Recommendations

  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.