Search Results:
136-150 of 658 results

One Swipe banishes 'Stuffphobia'

SecurEnvoy aim to eradicate the need for carrying around authentication tokens everyday with One Swipe.

Malware

Published 08 October 2013

Banks to face simulated cyber attack

Attack will test UK’s banking, payments and markets systems.

Malware

Published 07 October 2013

Data stolen from Adobe customers in security breach

Adobe has warned that 2.9m customers may have had personal information stolen following after hackers broke through their firewall.

Malware

Published 04 October 2013

Silent Circle's cyber security and privacy work around the world

Mike Janke, CEO of Silent Circle, talks about his work with the Tibetan government, law firms in Thailand and human rights groups in Sudan.

Malware

Published 03 October 2013

TRITON RiskVision discovers advanced persistent threats

New advanced threat protection solution claims to uniquely expose targeted attacks and unknown malware.

Malware

Published 03 October 2013

Bank of England warns of cyber attacks

Bank needs to 'recognise the need to adapt to evolving threats.'

Malware

Published 02 October 2013

Malware and malicious apps hit one million mark

During the second quarter over 700, 000 malicious and risky apps were detected

Malware

Published 01 October 2013

ForeScout teams up with Splunk to provide security solution

Will integrate its CounterACT solution with Splunk's data analytics capabilities.

Malware

Published 30 September 2013

Bill Gates ID details hacked

Social security details of Bill Gates, Michelle Obama and Ashton Kutcher stolen from US data brokers.

Malware

Published 26 September 2013

Swedish court reduces Pirate Bay co-founder’s sentence to one year

Court says there is lack of sufficient evidence to prove him guilty.

Malware

Published 26 September 2013

Cloud in schools could be putting children at risk of privacy violations

Study has shown support for protecting vulnerable cloud users from their data being tracked and profiled for online advertising.

Malware

Published 24 September 2013

FireEye enters the stock market on a high

Security company FireEye entered the stock market with a promising start.

Published 23 September 2013

Apple's iPhone 5S fingerprint scanner 'hacked'

German group created a fake fingerprint and unlocked the device

Malware

Published 23 September 2013

Trendscape report highlights concerns over adopting the cloud

AIIM's latest Trendscape report highlights concerns over security risks of adopting new technology in businesses.

Malware

Published 18 September 2013

Tube cleaners refuse fingerprint clock-in

London Underground cleaners are protesting the introduction of fingerprint recognition machines.

Malware

Published 17 September 2013

136-150 of 658 results

Join our network

716 people like this.
1533 people follow this.

CBR Supplier Recommendations

  • Qualys - IT security risk and compliance solutions

    Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organisations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly secure and within regulatory compliance....

See more

CBR White Paper Recommendations

  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.