A new survey outlines the practical experience of IT/security professionals over the increasing use of personal devices within their business environment during the last 12 months.
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
Cutting off the Internet was the ultimate and third penalty step against those caught breaking the anti-piracy law.
This special report offers a comprehensive review of information security industry certifications, highlighting which ones can best help you achieve goals specific to your information security career path.
At a time when EU data-protection legislation is under review and companies are increasingly urged to protect the sensitive customer and employee data they hold, Iron Mountain research shows that just over one third of European office workers regularly share confidential company information with their colleagues, and more than a quarter are passing on secrets about other staff!
WASHINGTON: A British telecom company has ditched the third-largest email provider, Yahoo Mail, as its default email service, keeping in view the service’s vulnerability to getting hacked.
A few years back, I knew a guy who had a mole on his forehead, which started to grow and change shape. As a survivor of melanoma, I know this is not a good thing.
SINGAPORE: Singapore is ramping up its supply of cyber-security experts through a training programme that will be conducted in Israel.
Specialists of Kaspersky Lab have detected another spy network that was engaged into public and industrial espionage on the Internet.
SINGAPORE–Elements of Asian culture, such as the region’s fear of failure, tendency to follow checklists when it comes to IT security and prioritizing low cost over quality are some hurdles organizations in the region must overcome to improve their security posture.
As organizations develop new products, services, infrastructures, and business processes that facilitate the collection and management of an ever-wider range of customer data, they’re discovering that privacy issues must be addressed from the very beginning of the design process.