The guide provides an overview of the key elements needed to implement technology with a lower risk and exposure to cyber-threats.
Mobile Security Precautions Lag Among Users
A quarter mistakenly believe that deleting sensitive files/folders and locking devices with a passcode are effective and trustworthy precautions.
Microsoft Announces a Rash of New Security Initiatives
Microsoft has outlined a new approach to security, announcing the Cyber Defense Operations Center and cross-company investments.
Cook: ‘We’ll Work with UK but Won’t Stop End-to-End Encryption’
Apple CEO hopeful government will change its tune
Trend Micro: Major Q3 Attacks Could be Sign of Things to Come
Firms must be ready for ‘chain reaction’ attacks.
Casinos and Video Piracy Mark Malware Campaign Affecting 1 Million
A massive malvertising campaign uses a surprising 30+ pieces of malware to infect victims, including CryptoWall and the Bunitu Trojan.
IBM: Ransomware, Insider Threats Top 2015 Cyber-Trends
Amateur hacker carelessness and C-suite attention round out the top four cyber-threat trends of the year.
IBM: Ransomware, Insider Threats Top 2015 Cyber-Trends
Amateur hacker carelessness and C-suite attention round out the top four cyber-threat trends of the year.
RSA Appoints Fresh Strategy Chief
Appointment is a response to the security industry’s threat approach failing “spectacularly.”
Mobile Device Thefts Fall in UK
Bad news for BYOD as more mobiles are stolen in 10 cities.