Search Results | Malware
PREV 1...20   30   40...56   57   58   59   60   61   62   63   64   65...   70   75...76 NEXT
Sort by:  Most Relevant  |  Date
IoT requires a new security paradigm

Blog  For computing, security has traditionally been an endpoint game with antivirus protecting the desktop and intrusion detection on the server, monitoring for suspicious activity and alerting when it detects anything. Today, the endpoints have evolved to be a multitude of different devices connected to...

Last updated: Jun 7, 2017   7:12 PM GMT  |  Blog: IoT Agenda   |      endpoint protection, Internet of Things, iot
CMDB meets IoT and Security

Blog  Back in February of 2011, I wrote an article called "Disruptive Tech Drives Need for Configuration Management". The article referenced something called light cubes which I had read about in a Yahoo! News article titled Wireless advances could mean no more cell towers. At the time, intern...

Last updated: Nov 2, 2016   4:22 PM GMT  |  Blog: Modern Operations: Apps & Stacks   |      Cellular networks, CMDB, CMS
GSM Exploitation, ATM Hacks, and Vegas Parties- OH My!

Blog   Blackhat and Defcon always are a great time in Las Vegas for security practitioners and hackers alike. True to form, this year hit the mark again! Here's a rundown on some of the more interesting findings/talks during the conventions. The Electronic Frontier Foundation (EFF) is an organization ...

Last updated: Aug 6, 2010   4:50 PM GMT  |  Blog: Harmonizing Regulatory Compliance and Risk Management   |      2010, b-sides, blackhat
Loom Systems CTO: Why DevOps needs more Artificial Intelligence

Blog  Artificial Intelligence (AI) could help theDevOps profession, massively. Think about it, all that control and ability to connect and coordinate things, elements, code streams and workflows (that's what DevOps is all about, right?) yet do so more automatically. Slow adoption curve CTO of Loom Sy...

Last updated: Feb 22, 2017   5:21 PM GMT  |  Blog: CW Developer Network
Security and SaaS: a compelling combination

Blog   It's been my second day at the Gartner IT Security Summit. Many of my CISO colleagues were clearly flagging by lunchtime. Several went home early as there was little of interest for them, generally sessions led by Gartner analysts spouting their latest theories, or the odd vendor promoting a p...

Last updated: Sep 30, 2008   10:43 PM GMT  |  Blog: David Laceys IT Security Blog   |      Security Solutions, Technology, vulnerability management
Beginning of Summer Security News Roundup

Blog  Sometimes the daily grind of log management, provisioning personnel and staying on top of IT security issues is just too much. You need a break to relax by the pool and sip an iced tea in the summer sunshine. Well, don't we all. That's not reality though. Without careful and constant vigilance, hack...

Last updated: Jul 2, 2014   2:37 PM GMT  |  Blog: Jeff Cutler's Keys to Security   |      Data breach, Email, IT security
FCC privacy restrictions could hinder AT&T's targeted ad plan

Blog  New privacy rules passed by the FCC could influence AT&T's plans for its acquisition of Time Warner. Also in recent GRC news, the internet of things proves useful to hackers and privacy regulators in Europe warned WhatsApp and Yahoo about sharing users' private information. Privacy rules impact ...

Last updated: Nov 3, 2016   4:03 PM GMT  |  Blog: IT Compliance Advisor
Using virtual appliances with VMware

Blog   VMwares Virtual Appliance Marketplace has over 800 appliances available for download over a wide range of categories that can be used in your VMware environment. For those who may not be familiar, virtual appliances are pre-built, pre-configured virtual machines for use in virtual environments t...

Last updated: May 20, 2008   2:26 PM GMT  |  Blog: The Virtualization Room
Apparent Win10 Defender Update Issues Illusory

Blog  Over the past week to ten days, lots of users have been reporting issues with Windows Update and Windows Defender. This applies to versions 1607 (Current Branch) and 1703 (Insider Preview aka Creators Update). The symptom is that while Windows Update reports a Definition Update for Defender is avail...

Last updated: Apr 5, 2017   3:49 PM GMT  |  Blog: Windows Enterprise Desktop   |      Troubleshooting, Windows 10, Windows Defender
Channel news: State dept. gets pwned; CVS releases private data

Blog  U.S. state dept. gets pwned A break-in targeting State Department computers worldwide last summer occurred after a department employee in Asia opened a mysterious e-mail that quietly allowed hackers inside the U.S. government's network. Not-so-compliant: CVS leaves credit-card, SSN and prescripti...

Last updated: Apr 19, 2007   12:38 AM GMT  |  Blog: Channel Marker
Channel news: Jobs, Gates get jolly onstage; IM attacks rise 73%

Blog  Jobs and Gates bury the hatchet Bill Gates and Steve Jobs, two of the greatest rivals in technology, made a rare joint appearance last night, but surprised followers of their bitter saga by showering each other with praise. [TimesOnline] IM attacks so far increased 73% over 2006 Security researchers...

Last updated: May 31, 2007   12:04 AM GMT  |  Blog: Channel Marker
Fabuloso Windows Rescue Kit Works Wonders With Vista

Blog  Occasionally, admins need to break the rules that Vista applies--sometimes quite severely--to its users. Case in point: Vista absolutely refuses to permit any account to delete files from the %windir%\System32 and %SystemDrive%\Program Files directories. You can try all kinds of contortions: changin...

Last updated: Nov 18, 2008   2:06 PM GMT  |  Blog: Windows Enterprise Desktop
Blog Gets New Name

Blog  In case you didn't notice, I've retitled this blog with TechTarget's blessing. Whereas it used to be called the Vista Enterprise Desktop blog, what with the looming release of Windows 7 and continuing interest in Windox XP on enterprise desktops, I thought it made sense to broaden the scope to inclu...

Last updated: Jul 8, 2009   4:32 PM GMT  |  Blog: Windows Enterprise Desktop
The Interesting Economics of Windows InTune

Blog  To my great interest and surprise, this morning MS announced it would be making its cloud-based Windows InTune desktop licensing, remote access, and management tools available for $11 (without Microsoft Desktop Optimization Pack, or MDOP) or $12 (with MDOP) a month, starting March 23, 2011. I'd been...

Last updated: Feb 28, 2011   8:42 PM GMT  |  Blog: Windows Enterprise Desktop
Symantec announces beefed up DeepSight service, new authentication capabilities

Blog   Move is part of an industry trend that turns threat intelligence data into actionable information. Symantec is bolstering its DeepSight service and integrating its VeriSign acquisition. The company recently announced its new Intelligent Authentication platform, which addresses secure access to w...

Last updated: Oct 18, 2011   1:49 PM GMT  |  Blog: Security Bytes
Cybersecurity and CES 2016: A comedy of omissions

Blog  We're doomed. I try not to be too much of an alarmist when it comes to information security matters, because all things considered, the situation on a global level could be a lot worse. We could all be suffering from malware induced power grid outages like the Ukraine, or experiencing stunning i...

Last updated: Jan 8, 2016   7:27 PM GMT  |  Blog: Security Bytes   |      CES
Stemming the deluge of analytic-driven overnotification

Blog   Analytics image via Shutterstock By James Kobielus (@jameskobielus) Some possessions are best left mute and dumb, unless you feel you cant get through life if everything you own isnt constantly peppering you with friendly reminders, like an overbearing spouse. Machines dont need to...

Last updated: Apr 3, 2015   1:49 PM GMT  |  Blog: Enterprise IT Watch Blog   |      Analytics, Internet of Things
Botnets target eBay users

Blog  Here's another example of how malicious hackers are in it for the money: Botnet owners are using their arsenal of hijacked computers to steal account information from eBay users. One victim, Sam Houston, has written an extensive account about it in his blog. He writes that he awoke Monday morning t...

Last updated: Sep 4, 2007   12:48 AM GMT  |  Blog: Security Bytes
Sony is Hacked Again

Blog   Security is not evidenced merely through the absence of harm. A harming event may be transpiring in this moment, not yet apparent. a B-TW warning. You may remember my discussion of Sonys earlier breach in my article, Sony is Sorry. I dont mean to be mean, but th...

Last updated: May 20, 2011   6:20 PM GMT  |  Blog: The Business-Technology Weave
Cyber Espionage in the Modern Age

Blog   Staying ahead of threats and potentials is the name of the game today in the realm of risk, unmanaged possibilities become probabilities. Therefore, manage your security. Cyber espionage, the unauthorized surveilling of data or outright theft of it, is a problem in virtually every part ...

Last updated: Sep 29, 2011   2:20 PM GMT  |  Blog: The Business-Technology Weave
PREV 1...20   30   40...56   57   58   59   60   61   62   63   64   65...   70   75...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: