Search Results:
1-15 of 658 results

Dangerous spam targets Brits with fake Easter offers

People are being conned out of money and their personal data with the temptation of God and Viagra.

Malware

Published 17 April 2014

Is Google Glass susceptible to Heartbleed?

Millions of Android smartphones and tablets are already vulnerable to the exploit.

Published 16 April 2014

Stop using passwords that are hard to remember but easy for computers to guess

A long string of memorable words is much more secure than a short set of random characters.

Malware

Published 16 April 2014

Threat Horizons 2016 shows cyber 'cold war' has turned hot

Information Security Forum highlights the need for trust in cyberspace.

Malware

Published 15 April 2014

Patch management requires ‘automated approach’ to avoid cybercrime

Research reveals a 128.6% rise in vulnerabilities for Microsoft products in 2013 compared to 2012.

Malware

Published 15 April 2014

Why IT departments are putting their companies at risk of cyber attacks

About 5% of organisations believe they can deal with targeted cyber-attacks.

Malware

Published 14 April 2014

NSA denies prior knowledge of Heartbleed bug

Agency rejects Bloomberg claim that it exploited security flaw to obtain passwords.

Security

Published 14 April 2014

How does the Heartbleed bug work?

A visual guide to the Heartbleed threat.

Malware

Published 11 April 2014

Heartbleed: Why changing your password is the worst advice EVER

Security experts say 'don’t listen to Tumblr'.

Malware

Published 11 April 2014

Everything you need to know about the Sasser worm

The worm, created by a 17-year-old, that brought companies around the world to a standstill.

Malware

Published 11 April 2014

BYOD in conjunction with Windows To Go could be the future of flexible working

Security is all well and good, but don’t forget the human factor, Imation's EMEA VP Nick Banks tells CBR.

Desktops

Published 10 April 2014

Heartbleed: Everything we thought was secure is not

The computer bug that changed cyber security forever.

Malware

Published 10 April 2014

Dating app Tinder infected by dangerous bots

Swipe right, chat to a fake user and your personal data could be stolen.

Malware

Published 03 April 2014

21 of the world's top news outlets have been target of 'state-sponsored' hacking

Journalists under more threat than anyone else, public knowledge is just "tip of the iceberg".

Malware

Published 28 March 2014

The real reasons you are struggling to test disaster recovery systems

Companies run the risk of wasting their investment.

Malware

Published 25 March 2014

1-15 of 658 results

Join our network

715 people like this.
1526 people follow this.

CBR Supplier Recommendations

  • Qualys - IT security risk and compliance solutions

    Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organisations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly secure and within regulatory compliance....

See more

CBR White Paper Recommendations

  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.