- German researchers hack Galaxy S5 fingerprint login
- Today's Approach to Security is Broken
- JP Morgan to invest £150 million on boosting cyber security
- Financial services firms to increase cyber security budgets this year, PwC claims
- Lower costs help NZ pip Australia for F5 Networks support centre
National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone.
Oracle has issued a comprehensive list of its software that may or may not be affected by the OpenSSL (secure sockets layer) vulnerability known as Heartbleed, while warning that no fixes are yet available for some likely affected products.
The Open University has unveiled its new Masters qualification in Computing which includes a new modules for corporate digital forensics.
For the second time in less than two years, Symantec Corp. has a new chief executive officer.
Employers including Atos, BT, Cassidian, IBM and QinetiQ have joined forces to create new specialist cyber security apprenticeships for school leavers through e-skills UK.
A former federal prosecutor and cybercrime expert tells CIO.com how IT departments can retrieve text messages that the user thought were deleted months or even years ago. As more litigation and investigations turn on the content of texts, every CIO needs to know how to find the smoking gun.
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.
BlackBerry's fall means CIOs must quickly develop a new mobile strategy. The big three of enterprise mobility are familiar names -- Apple, Samsung and Microsoft. Who will win out?
The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
Whitepapers about IT management
The digital revolution continues to destroy firms that don’t anticipate market shifts quickly enough to leverage new opportunities and avoid new pitfalls. The need for business agility is driving the Agile movement in software development — and continuous improvement is at the heart of the movement. In this Forrester study, we look at the the intuitive and counter-intuitive data points surrounding the commonly held beliefs about the Agile development tenants that guide the day-to-day behaviour of development team members. Click to download.
Sign up now »
Proactive web security that blocks threats in the cloud before they reach users’ machines, or enter customers’ networks.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.