Items Tagged with 'cyber security news'

ARTICLES

Going Further Than Encryption for Data Regulation in the Cloud

July 22, 2014
Moving information from enterprise data centers or in-network servers to a cloud environment is often chosen as a means to offload IT maintenance costs, provide a higher degree of physical safeguards and facilitate easier scaling to accommodate business growth.
Read More

29% of Canadian IT Security Professionals Would Overhaul Existing Systems

July 17, 2014

Twenty-three percent of Canadian cybersecurity teams never speak with their executive team about cybersecurity, but of those that did, 23 percent spoke just annually, and 24 percent spoke with the C-Suite semi-annually. Only 13 percent of IT Canadian security professionals spoke with executives quarterly, according to a new Ponemon Institute study with Websense, Inc.


Read More

Tesla Sedan Targeted in Chinese Hacking Competition

July 17, 2014

Representatives from Tesla Motors Inc., say the company will be investigating and rectifying any vulnerabilities discovered as a result of a hacking contest in Beijing starting today, of which the Tesla Model S sedan is the key target.


Read More

Survey: Critical Infrastructure Companies Woefully Unprepared for Security Breaches

July 10, 2014

Nearly 70 percent of critical infrastructure companies surveyed by Unisys and the Ponemon Institute suffered a security breach in the last year. According to the report, “Despite staggering statistics around the number of security breaches within these sectors, results showed that they gap between security concern and preparedness is overwhelming.”


Read More

How Advancing Threat Intelligence Can Combat Cyber Attacks

July 8, 2014
Technology, demographics, economic and geopolitical forces are constantly shifting, creating a fluid cybersecurity environment.
Read More

Protecting Data Against Wearable Technology Risks

Many tech giants have recently made a big push in wearable items.
June 1, 2014

An organization has to look at the whole picture when thinking about the risks and acceptable use policy regarding wearable technology.


Read More

9 Strategies to Protect Privacy in Cyber Space

Privacy issues have long been a big concern when it comes to cybersecurity, but with major security breaches like the one Target experienced in December 2013
June 1, 2014

In the event of a breach, you need to have a written plan to take immediate steps and know who is going to analyze the problem, who will notify the people impacted by the breach, and who you can call for help, among other things.


Read More

Facing an Uncertain Future in Cybersecurity Enforcement

The FTC has become the nation’s leading force to drive and enforce consumer privacy
June 1, 2014

In early May, the FTC’s Chief Administrative Law Judge held that in an enforcement action the FTC must disclose “what data security standards, if any” it has published and intends to rely upon to demonstrate that a company’s data security practices are not reasonable and appropriate.


Read More

Waging War Against Email Phishing with DMARC

May 27, 2014
An abundance of channels exist today to communicate through online messaging, yet email remains the most mature method to do so and is an integral part of people’s daily activity.
Read More

Massive Breach Triggers Investigation of Security Practices at eBay

May 27, 2014

Following a massive cyberattack, eBay is reportedly facing a formal investigation with the government over security practices. The online auction site will have to answer questions about what type of security was in place before hackers gained access to the personal data of its 145 million users.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

July 2014

2014 July

In the July issue of Security Magazine, read about how the NFL is balancing security with fan experience to make sure sporting events are running smoothly. If you're doing any traveling this summer, be sure to read the 5 hot spots for business travel security, also, employers can track on-the-go employees with new mobile apps. Also, check out the latest news and industry innovations for the security industry.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+