DOSarrest Internet Security announced today that it will begin offering a website Vulnerability Testing and Optimization (VTO) service.
Information security has always required specialised knowledge – not least to decipher all the acronyms and geek speak!
I have spent the last 18 months pondering on the whole sphere of identity and authentication and a number of things have happened:
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed. Microsoft will stop releasing security updates for the OS on that date.
Cloud computing is growing, both as an external business tool and as a way to better manage IT in the enterprise.
Most of the data breach incidents analysed by the Information Commissioner’s Office (ICO) in a three-month period earlier this year concerned errors in the way personal information was disclosed, the watchdog has said.
The Central Tibetan Administration website has been hacked to serve up a Java exploit that drops advanced malware, marking the latest attempt to compromise people hoping for freedom from Chinese control in the province.
How much Internet traffic is being actively intercepted and reviewed by the National Security Agency (NSA)?
The generation gap has existed for –well — generations. But the current divide between twentysomethings and their elders in the IT workforce
Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that it has joined the Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) as a sponsoring member.