- U.S. commission fingers China as biggest cyberthreat
- Heist once again highlights e-banking vulnerabilities
- Web application, insider threat attacks to continue into 2013: Imperva
- Mobile apps expose personal information
- Google follows Apple's lead with Android app security screening
- Security experts push back at 'Cyber Pearl Harbor' warning
- How IT Leaders Can Best Plan for Disaster
- Google services went down for 30 minutes in Asia this morning, CDN says
- Judge throws out Ohio lawsuit over software on vote tabulation machines
- Researcher finds critical vulnerabilities in Sophos antivirus product
- Resistance is futile: CISOs talk about embracing change
- Volunteering falls short on threat information sharing
On the Internet, no one knows you're an authoritarian government
Our penchant for speaking euphemistically about those we believe to be responsible for cyberattacks has led to a state of utter confusion. It's time to stop.
Heist once again highlights e-banking vulnerabilities
Commercial customers need to heed warnings from cyber thefts in Missouri, Maine
U.S. commission fingers China as biggest cyberthreat
Annual report, mandated by Congress, raises the question of how best to defend against such cyberattacks
Book excerpt: 'The Holistic Operational Readiness Security Evaluation: HORSE Project Series'
A peek at Volume 1 of Michael D. Peters' HORSE Project Series: "Governance Documentation and Information Technology Security Policies Demystified"
Reduce Email Archives up to 60%
Are you considering implementing a proactive archiving and eDiscovery solutions? This paper summarizes 15 separate soft cost savings when implementing Symantec Enterprise Vault and the Clearwell eDiscovery Platform.
Aberdeen Report: To Patch, or Not to Patch? (Not If, But How)
The report explores the correlation between the current use of patch management and the level of endpoint-related risk that companies are effectively accepting.