CESG publishes identity proofing guidelines

Access management is designed to allow only authorized digital identities to gain access to a system. But a digital identity is nothing more than “a collection of attributes that uniquely define a person or organization.” Proofing is the process of ens…

Read More >>

Adware: the most pervasive mobile threat

A new examination of mobile threat data from the Lookout Platform in five countries has found that threats to consumers run the gamut, from annoying to extremely invasive. The study has uncovered that adware and malware threats like spyware, surveillan…

Read More >>

Connected TVs open up a host of threat vectors

In today’s world, everything from refrigerators to cars are beginning to get “connected” and given the ability to talk to you and to other things via broadband networks. Much of this still seems like science fiction, but when it comes to connected TVs,…

Read More >>

Secunia names new CEO

Secunia, the Copenhagen-based provider of security software, announced the appointment of Microsoft’s Peter Colsted as the firm’s new chief executive.

Read More >>