Panda Cloud Systems Management adds mobile device management features, helping companies manage, monitor and support their IT systems remotely
Browsing: Breaches
Perhaps taking a step back and looking at history may provide some answers. In trying to make sense of the past, we can divide the evolution of computing
I would like to share 5 resolutions that should not only be part of a list for the New Year but should be part of a regular security awareness plan.
Journalists are deploying SecureDrop en mass, from Forbes, New Yorker to Wired. As a result we will begin to see more and broader leaks worldwide.
A recent study* suggesting that 41% of organisations are planning to increase their IT security budget by 16% in 2014
Latest Hacker Intelligence Initiative Report Finds Cyber Criminals Adopting Database as a Service for Infection and Data Exfiltration
Even though most banks offer specialized apps for online banking, most smartphone apps are not protected as well as their website counterparts.
Endpoint cybercrime prevention specialist Trusteer, an IBM company, has announced the results of a recent study on the State of Targeted Attacks.
“A chain is only as strong as its weakest link”, it seems so cliché that most of us have no clue where this phrase originated or pay attention to the truth
CWJobs.co.uk explores how organisations are reacting to an enhanced need for data security, and what impact this could have for workers in the industry.