Search Results:
106-120 of 772 results

How do you solve a problem like the NSA?

Firefox is putting the solution to web privacy in the hands of the people, all thanks to open-source.

Malware

Published 15 January 2014

Patch Tuesday: are your machines protected?

Microsoft releases first security patches for 2014.

Malware

Published 15 January 2014

UK public sector facing Windows XP ‘hacker storm’

Time is running out for bodies as Microsoft prepares to retire operating system.

Malware

Published 14 January 2014

The reason one IT security expert refuses to use debit cards

The personal data of as many as 70 million Americans was breached in December.

Malware

Published 14 January 2014

SPOILER: Ever wondered what all the computer coding means in films?

The code in Iron Man’s visor is actually for a Lego computer.

Malware

Published 14 January 2014

RSA talkers dropping like flies

Influential speakers are withdrawing from upcoming conference following allegations of NSA collusion.

Malware

Published 09 January 2014

McAfee brand ditched

Intel rebrands security software with own name amid founder’s bizarre antics.

Malware

Published 07 January 2014

Cyber-thieves use infected USB sticks to rob ATMs

The criminals made holes in the machines to attach infected drives.

Malware

Published 31 December 2013

NSA paid RSA $10 million for encryption access

Security firm created a 'back door' for NSA by offering flawed security.

Malware

Published 21 December 2013

Guest Blog: Trapping malware in the sandbox

Threat emulation is a key new technique forpreventing zero-day and targeted attacks. Tom Davison of Check Point explains how this method delivers...

Malware

Published 20 December 2013

UK consumers putting mobile data at risk

Shoppers have no security installed on their mobile device.

Malware

Published 19 December 2013

UK employees receiving up to 10 phishing attacks per day

Another 16% of office workers had fallen for a phishing attack.

Malware

Published 19 December 2013

Blue Coat snaps up anti-malware firm Norman Shark

The company will integrate its malware analysis solution with Norman Shark's sandboxing solution.

Malware

Published 19 December 2013

Brazil denies Snowden asylum

Brazilian government has 'received no official request'.

Malware

Published 18 December 2013

OTP vendors ‘to offer more solutions to combat security threats’

Frost & Sullivan report claims mobile device proliferation will spur innovation.

Malware

Published 17 December 2013

106-120 of 772 results

Join our network

755 people like this.
0 people follow this.

CBR Supplier Recommendations

  • Qualys - IT security risk and compliance solutions

    Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organisations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly secure and within regulatory compliance....

See more

CBR White Paper Recommendations

  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.