Threat of the month: Network deperimeterization
A study by the Information Security Community on LinkedIn found most organizations don't have proper polices and support for BYOD.
This month's threat stats look into U.S. and international hackers' attack preferences. U.S. attackers favor the Allaple.A worm, whereas foreign hackers often harness the Zero Access trojan.
This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.
A flaw in Apple's popular music player allows for miscreants to execute remote code.
Apple on Monday released an updated version of its iTunes program to close a vulnerability that could lead to a man-in-the-middle attack.