Search Results:
151-165 of 772 results

Verizon releases security solution to protect ‘Internet of Things’

The certificates could be used to provide authentication and content integrity in systems associated with smart meters and software-based controls...

Malware

Published 20 November 2013

CipherCloud releases solution for Salesforce's AppExchange

Creates reports on any abuse of confidential information.

Malware

Published 19 November 2013

Arbor Networks launches cloud protection services

The Arbor CloudSM DDoS protection solution enables companies to launch and enhance cloud-based DDoS managed services.

Malware

Published 18 November 2013

GCHQ used 'Quantum Insert' technique to set up fake LinkedIn pages

Agency also spied on mobile phone service providers.

Malware

Published 12 November 2013

Exatel selects Arbor Networks' Peakslow SP platform to launch managed security service

Poland's Exatel aims to deliver DDoS attack protection to its enterprise customers.

Malware

Published 08 November 2013

Hackers steal 4,100 Bitcoins from Inputs.io

Load was worth $1.18M.

Malware

Published 08 November 2013

All fingers and thumbs

With the aid of biometrics, Duncan MacRae’s fingers can help him gain access to a host of nations and buildings.

Malware

Published 07 November 2013

Adobe passwords revealed

Are you amongst the clever folk who used 123456?

Malware

Published 06 November 2013

43,000 customers could be hit after loyalty card cyber attack

Irish firm suffers serious breach of security.

Malware

Published 06 November 2013

Guest blog: User and App centric security

Nick Bowman, F5 Networks, on the new set of challenges in the security landscape.

Malware

Published 05 November 2013

Top 5 Android security apps

The best anti-virus software to keep your device 'madware-free'.

Malware

Published 05 November 2013

Infoblox to reduce APTs with FireEye's NX Series

Detects malicious behaviour using an automated approach that tests and observes files of a suspicious nature.

Malware

Published 04 November 2013

Tablets and smartphones banned from Cabinet meetings

Security stepped up at Number 10 amid concerns devices could be bugged by China, Russia, Iran or Pakistan.

Malware

Published 04 November 2013

Yahoo starts $15,000 bug bounty system

Search giant will pay ethical hackers who find vulnerabilities in web services.

Malware

Published 04 November 2013

Afternoon infographic: PRISM is only a symptom

The causes of data breaches are shifting.

Malware

Published 01 November 2013

151-165 of 772 results

Join our network

755 people like this.
0 people follow this.

CBR Supplier Recommendations

  • Qualys - IT security risk and compliance solutions

    Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organisations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly secure and within regulatory compliance....

See more

CBR White Paper Recommendations

  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.