The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Securities regulators in Pennsylvania and other states are warning investors to keep an eye out for “mutations of old schemes and themes” as con artists seek to profit from new
A new report published by Gartner Research places emphasis on another use for mobile technology in the financial transaction chain — as a security layer for user authentication via global
Chief security and information officers beware: IT professionals are using personal email accounts to mask file transfer activity from management, according to a study released today by Ipswitch, Inc., the
FREE Webinar from Moog Quikset on July 27!With the increased concern over terrorist threats and intrusions at critical infrastructure sites, installing and operating a reliable, flexible and compliant detection, surveillance,
FREE Webinar from Moog Quikset on July 27! With the increased concern over terrorist threats and intrusions at critical infrastructure sites, installing and operating a reliable, flexible and compliant detection,
The chief of the Federal Deposit Insurance Corporation’s Cyber Fraud and Financial Crimes Section recently released his top five list of fraud threats of concern to the FDIC: 1. Malware
A Senator from Virginia is calling on the U.S. President to develop plans to safeguard offshore platforms from attack by terrorists. While the BP oil disaster in the Gulf of
Two bills that seek to reduce the risk of a terrorist attack on U.S. chemical facilities and water treatment plants were delivered to the Senate June 15. A Democratic Senator
The Office of Infrastructure Protection (IP), as the Chemical Sector-Specific Agency together with the Chemical Sector Coordinating Council, recently co-sponsored the 2010 Chemical Sector Security Summit, which drew more than
Security magazine is taking nominations for the top security products of the year. Our September 2010 issue will feature the top security products, based on input from our security end