Is danger looming: Mobile vulnerabilities
With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.
With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.
Sanjeev Sah has been CISO of UNC-Charlotte for just over a year, and he’s already well versed on the unique circumstances that make securing colleges unlike any other vertical.
Web browsers have become today’s de facto operating system — the single place where end-users spend most of their time. As such, they’re ground zero for attacks. Technology, though, is coming to the rescue.
Isn’t Wyndham Hotels and Resorts culpable for failing to enlist industry standards and implement security practices and tools to protect customer accounts?
Debate: Flame, Stuxnet and other APTs are hype, but you should still be extremely worried.
The Payment Card Industry Security Council is working to foster greater PCI expertise across the industry.
This month’s threat of the month is anti-virtualization malware which automatically activates on a system boot-up.
With billions of devices worldwide running Java, Oracle faced a debacle in August as the details for two zero-day exploits in its popular software were leaked and actively used in attacks.
Because people have behavioral characteristics, the Silver Tail Forensics 3.0 – latest incarnation of this fine tool – can catch and stop them while providing analytical capabilities for forensic analysts.
Seeker from Quotium takes a somewhat different approach to application security from most similar products.