The Cyber Security Challenge UK 2011/2012 – the second year-long challenge designed to raise awareness of IT security skills amongst students of all ages – is now under way.
Number of compromised records drops precipitously, Verizon finds
The number of compromised records involved in data breaches plummeted from 144 million in 2009 to only 4 million in 2010, but the number of data breaches soared to its highest number ever, according to the 2011 Verizon Data Breach Investigations Report.
SANS Institute to teach VOIP security course for first time in Europe
The SANS Institute has announced its intent to offer VOIP security courses in Europe for the first time. Plans call for the course to be offered at the institute’s Amsterdam operations centre from May onwards.
Apple releases Safari, Leopard, Snow Leopard security updates
Apple has released security updates to its Safari web browser as well as its Leopard and Snow Leopard operating systems.
Google says GSA certified its Google Apps for Government under FISMA
In response to theDepartment of Justice (DoJ) and Microsoft, Google said that the General Services Administration (GSA) had determined that Google Apps for Government was certified under the Federal Information Security Management Act (FISMA), a claim …
Whitehall black-on-black text security blunder reveals info on multiple websites
An elementary security error involving the use of black text on a black background with redacted security documents published on the web effectively made the IT prowess of the Ministry of Defence, and other government departments, a laughing stock over…
Linkedin social engineering test snares 68% of users
Trusteer, the in-browser security specialist, recently conducted a honeypot social engineering test on 100 users of LinkedIn, with 68% of users potentially infecting themselves.
Network access control, not perimeter security, should be priority, says Cyber-Ark exec
Organizations are wasting money beefing up security at the perimeter when they should be focusing on securing access within the network, said Adam Bosnian, executive vice president Americas and corporate development at Cyber-Ark Software
Network access control, not perimeter security, should be priority, says Cyber-Ark exec
Organizations are wasting money beefing up security at the perimeter when they should be focusing on securing access within the network, said Adam Bosnian, executive vice president Americas and corporate development at Cyber-Ark Software
Enterprises ignore cybercrime trends at their peril, says security researcher
Cybercriminals know the value of data better than the organizations they are targeting, according to a security strategist who studies hacker behavior.