4 Steps for Student Online Security

At university, you’ll find that a large majority of your time will be spent on your laptop or computer. Whether it’s writing essays, applying for jobs
Most visits to a login page are made by malicious tools

Incapsula surveyed 1,000 websites over a 90-day period, during which we recorded over 1.4 million unauthenticated access attempts and 20,376 authenticated logins.
Whitepaper: Best practices for making BYOD simple and secure

BYOD programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops.
Apple takes strong privacy stance in new report, publishes rare “warrant canary”

Apple has become one of the first big-name tech companies to use a novel legal tactic to indicate whether the government has requested user information
Windows XP might lose Security Essentials updates after April 2014

Microsoft might stop updating Microsoft Security Essentials (MSE) antivirus software on systems running Windows XP after next April’s support cut-off
Fujitsu shows off servers that use light and lasers to transfer data

Fujitsu has demonstrated servers with thin fiber optics that will use lasers and light transfer data, replacing the older and slower electrical wiring
IT Security From The Eyes Of Data Scientists

As IT security leaders try to base more of their day-to-day decisions on statistical analysis of relevant data coming from IT infrastructure and business
Imperva: The rise and rise of ColdFusion-driven breaches

ColdFusion induced breaches are definitely on the rise, which teaches us that hackers and security researchers are looking into this platform more and more as a green field for hacking endeavours.
ICS-ISAC and ISAC Member Automatak both Fall 2013 HOST Investment Awardees

The ICS-ISAC is pleased to announce that we are a recipient of one of four HOST awards to support our Situational Awareness Reference Architecture (SARA) pilot Phase 1.
Are Cyber-Criminals Looking To Target SAP Users?

It’s been long known that cyber-criminals utilize advanced information-stealing malware and Trojans to gain access to corporate endpoints and networks, disrupt operations and steal sensitive business data, intellectual property and financial information.