The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

WEDNESDAY, MAY 25, 2016

Featured

Archives

Latest Comments

Social Networks

In-depth cyber defense sees the process of stopping attacks as being only half of the protection activity. Going to the roots of the incident or of the event and thus preparing the system in order to fend off future similar situations is the subsidiary defense move that completes any cyber-shield. Since an ongoing event is […]

Read more ...

Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do. These options include both hardware and software approaches IT pros can take to defeat the malware, a group at this weekend’s Security […]

Read more ...

Every day there seems to be a new vulnerability or large-scale information security breach to read about. These constant reminders of cyber-security’s importance are highly justified. But for large enterprises, which are offered multiple products and solutions to protect their systems from a growing variety of threats, it’s often difficult to determine where to start […]

Read more ...

The financial services industry is ratcheting up its support of legislation that would set nationwide data security standards and require businesses to notify customers following a breach. The push coincides with an annual advocacy gathering of retailers, who oppose the bill. The National Retail Federation is hosting its annual Retail Advocates Summit in Washington, D.C., […]

Read more ...

Really interesting research: “Online tracking: A 1-million-site measurement and analysis,” by Steven Englehardt and Arvind Narayanan: “Web privacy measurement — observing websites and services to detect, characterize and quantify privacy-impacting behaviors — has repeatedly forced companies to improve their privacy practices due to public pressure, press coverage, and regulatory action. On the other hand, web […]

Read more ...