From botnets and cyber attacks on the retail industry, to in-depth reporting on privacy today, our July issue is filled with insightful news.
There's a larger story than Edward Snowden, the 29-year-old whistleblower who released classified documents that contained details about the NSA's massive surveillance of U.S. citizens.
M&A activity and personnel announcements around the security industry, including the acquisitions of Websense and Vigilant, Secunia's new CEO, and more.
Hackers ransacked the servers of Drupal.org, international authorities shut down Liberty Reserve, and other news around the security industry.
Threat of the month
2 minutes on
Skills in Demand
There is increased demand for defensive-minded security pros with the ability to manage perimeter security technologies. These roles can be found in security teams that ...
Me and my job
For this month's "Me and My Job" we speak with Stephen Fridakis, senior IT security officer for the Food and Agriculture Organization of the United ...
Targeted attacks are easy and cheap, but not always anonymous, says Norman ASA's Snorre Fagerland.
There is no doubt that threats have evolved from vandalism and hobby-based malware to financially motivated crime and now state-sponsored espionage and attacks against government ...
Our educational institutions continue to set the pace in BYOD.
A battle rages between advertisers and privacy advocates over access to online behavior. Ryan Goldberg reports.
Speak in business terms and convey risk when attempting to gain funding for implementations from management, reports Stephen Lawton.
Thanks to willing accomplices and easy-to-use technology, the threat from linked computers is expanding, reports Karen Epper Hoffman.
Technological vulnerability and valuable data make retailers the latest target for malware attacks, says Jenny Craig CIO Abe Lietz. Karen Epper Hoffman investigates.
Group Test 1
Acronis activEcho provides document-sharing features, and hosts everything within one’s own private network.
The BEAM Mobility Platform from Bitzer Mobile allows IT departments to enforce data leakage protection policies while offering secure access to internal applications – without ...
Incorporating 256-bit AES encryption, two-factor authentication support and a secure sandbox model into an easy-to-deploy application, SafeZone is a great choice for administrators who want ...
Combining full mobile device management (MDM) with end-to-end encryption, Good for Enterprise from Good Technology offers an expansive suite of products, which allow administrators to ...
Kaspersky Security 10 for Mobile integrates mobile device management into the company’s security suite.
TrustCall for iPhone from KoolSpan offers hardware-based encrypted calling between off-the-shelf iPhones.
The MECS Server provides full-on, tamper-proof firewall and compliance policy that is pushed down to mobile devices connected either via mobile network or Wi-Fi.
ZENworks Mobile Management from Novell allows for full control of a mobile device from both a security and policy perspective.
Sophos Mobile Control provides a full set of features and functionality for management and control of a broad range of mobile devices.