Latest News

  • Changing business models, a dynamic threat landscape and fragmentation of security solutions: these are three key challenges for information security departments, most of which are suffering from what has become an infamous skills shortage in the cybersecurity workforce. Cisco has leapt into the breach with a set of managed security services meant to address the security gap.
  • In the wake of the Heartbleed vulnerability that has left a wide swath of websites vulnerable, Mozilla is taking steps to give its next-gen browser code an iron armor. The company has unveiled a bug bounty for a new certificate verification library that’s on track to be released as part of Firefox 31 in July.
  • The consumerization of IT and the bring-your-own-device phenomenon in the enterprise has given rise to concerns over data security stemming from risky mobile applications and unsecured devices. The US National Institute of Standards and Technology (NIST) is attempting to address the concerns with the launch of an open-source web application for managing the mobile app vetting process, dubbed AppVet.
  • SMS trojans are starting to appear in more and more countries, and for the first time, researchers have detected an active SMS trojan in the US.
  • Mobile banking trojans! Bitcoin wallet attacks! Cyber-espionage threats! It turns out that these three cyber-baddies are developing their attack trajectories exactly as predicted for 2014.
view more

Trending Topic - #Heartbleed

Blogs

  • Posted by Ernst & Young LLP • 16 April 2014
    By Mark Brown Much has been made of Microsoft’s decision to stop security support for Windows XP over the last few weeks. Some commentators have likened it to something of a Y2K-esque tech apo...
    rated:
  • Posted by IRM Plc • 14 April 2014
    By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times, titled...
    rated:
  • Posted by Bob Tarzey • 21 March 2014
    It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for ...
    rated:
  • Posted by Drew Amorosi • 17 March 2014
    Nine months and counting – nine months since Edward Snowden first told the world that the US government logged the metadata of all telephone traffic. Shortly after came PRISM, involvement by the...
    rated:
view more

Features

view more
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×