Search Results | Malware
PREV 1...30   40   50...67   68   69   70   71   72   73   74   75   76...77 NEXT
Sort by:  Most Relevant  |  Date
Social Networking and the Workplace

Blog   Increasingly I see articles about young employees lobbying managers and senior executives about using social networking sites for work-related activity. These sites generally comprise (perhaps compromise?) a mash of party pics, all manner of stream-of-consciousness ruminations, drunken esc...

Last updated: Jun 20, 2010   7:24 PM GMT  |  Blog: The Business-Technology Weave
Worth Considering: Paul Thurrott Praises the Win8 Desktop

Blog  There's a terrific piece over on Paul Thurrott's Supersite for Windows that posted yesterday, entitled "In Praise of the Windows 8 Desktop." In that story, he calls out all the new features on the old-fashioned but still extremely usable desktop in Windows 8 that deliver new or vastly improved funct...

Last updated: Mar 20, 2013   6:50 PM GMT  |  Blog: Windows Enterprise Desktop
Everything New is Old Again

Blog  Fifteen years ago, I had a little less weight around the middle, my hair was a slightly darker shade of brown, I had my first real suit ... and I was going to my first real job interviews. After four different interviews, two made serious offers: A computer operator for American Blind and Wallpap...

Last updated: Jun 1, 2012   11:00 AM GMT  |  Blog: Uncharted Waters
EMM software on every device? MobileIron makes the case

Blog  During the legal battle between Apple and the FBI over gaining access to an iPhone used by one of the San Bernardino shooters in December's terrorist attack, an unexpected development thrust enterprise mobile management software in general -- and EMM vendor MobileIron specifically into the limel...

Last updated: May 13, 2016   8:43 PM GMT  |  Blog: Security Bytes
Sears spyware illustrates perils of online commerce

Blog  My colleague, Dennis Fisher, has already blogged about Sears using spyware on its customers. But since I've come across plenty of blog chatter that reflects his opinion and mine, I've decided to offer my two cents. So thanks for indulging me this week... Every now and then, a big company does someth...

Last updated: Jan 4, 2008   5:31 PM GMT  |  Blog: Security Bytes
A rough week for Google security

Blog  Google's security reputation has been taking a beating in the blogosphere this week, with researchers spotlighting new flaws in the search giant's popular tools. Software developer Giorgio Maone offers a very good analysis in his Hackademics blog of which Google programs are flawed and who discover...

Last updated: Sep 28, 2007   0:11 AM GMT  |  Blog: Security Bytes
Your company's reputation: Critical but fragile

Blog  There is no more critical component to an organizations capacity for trust than reputation. Whether choosing to hand them money, customer information or your own health, the reputation of a prospective bank, partner, or hospital will likely be the reason you consider, choose or cut the organiz...

Last updated: Apr 7, 2009   7:17 PM GMT  |  Blog: Software Quality Insights
Western Union cloud security tool doubles as business enabler

Blog  Problem/solution As director of information security at Western Union, in charge of emerging technology and cloud security, David Levin has a deep appreciation of the risks attendant to cloud applications. He also recognizes that workers are under tremendous pressure to deliver results, and if a ...

Last updated: Sep 10, 2014   9:07 PM GMT  |  Blog: TotalCIO   |      CIO
An incompetent, unsafe and corrupt Surveillance Society ?

Blog   This morning the first of a season of reports on surveillance and information assurance was published. The House of Commons Home Affairs Select Committee report was released to the Sunday Papers at one minute past midnight. The Commons Press Gallery get their copies at 09.00 Monday mornin...

Last updated: Jun 8, 2008   9:12 AM GMT  |  Blog: When IT Meets Politics   |      RIPA, Wetware
Internet of threats: Managing risk and governing it

Blog  By now, we have an understanding that IoT devices, while useful and convenient, come with many security concerns. The simplicity that consumers love about IoT devices is, in fact, what makes them so risky. IoT devices are easy to connect to remotely by just about anyone and, unfortunately, not just ...

Last updated: Aug 28, 2018   4:13 PM GMT  |  Blog: IoT Agenda   |      Governance, Internet of Things, iot
How IoT botnets affect the 'internet of money,' cryptocurrency

Blog  In case you haven't heard about the term "cryptocurrency" yet, I would like to tell you about this "internet of money," or IoM. Cryptocurrency is an encrypted decentralized digital currency exchanged through blockchain with a process called mining. Bitcoin, for instance, is the first successful cryp...

Last updated: Feb 8, 2018   6:50 PM GMT  |  Blog: IoT Agenda   |      Big Data, Bitcoin, Blockchain
Five crucial security questions for your IoT project

Blog  2018 will be a big year for IoT. By some estimates 2.8 billion new devices will come online, enabling a variety of new scenarios that were science fiction just a decade ago. Connected medical devices, watches, home automation devices, smart cities, connected cars and industrial equipment are all cha...

Last updated: Jan 16, 2018   5:56 PM GMT  |  Blog: IoT Agenda   |      Application security, Cryptography, Identity management
Keeping up with digital change requires a new approach to security

Blog  We are living in an era of hyperconnectivity between systems, applications, devices and data. Technologies such as IoT, mobile computing, cloud-based services and multi-cloud infrastructures are not simply being added to the network; they are being interconnected in ways that are redefining not only...

Last updated: Feb 27, 2018   9:01 PM GMT  |  Blog: IoT Agenda   |      Attack surface, Automation, Digital transformation
GDPR: Why print is a crucial element of endpoint security

Blog  The EU General Data Protection Regulation (GDPR), which takes effect on 25th May 2018, could prove to be a catalyst tochange theexistinghaphazard approachto print security. Networked printers and multifunction printers (MFPs) are often overlooked when it comes to wider information security ...

Last updated: May 9, 2017   8:58 AM GMT  |  Blog: Quocirca Insights   |      GDPR, MPS, Security
Information Security the next generation

Blog  The position of Chief Information Security Officer (CISO) has become well established in recent years, but where is it heading next? For many it is often perceived as an inward directed role more accustomed to saying no than anything else. But is this really fair and does it represent the mode...

Last updated: Mar 25, 2018   9:00 PM GMT  |  Blog: Quocirca Insights
EC's anti-competitive stance is laudable, its action over Google & Android is laughable

Blog   As a football fan, one of my primary experiences of European antitrust law comes through watching the English Premier League on TV.Once upon a time, I paid Sky Sports for a subscription and saw any and all of the games that the Premier League allowed to broadcast live. Then the European Commission ...

Last updated: Apr 20, 2016   5:03 PM GMT  |  Blog: Computer Weekly Editor's Blog   |      Android, anti, Apple
Print security: The cost of complacency

Blog   Quocirca research reveals that enterprises place a low priority on print security despite over 60% admitting that they have experienced a print-related data breach.Any data breach can be damaging for any company, leaving it open to fines and causing damage to its reputation and undermining customer...

Last updated: Apr 23, 2014   7:45 PM GMT  |  Blog: Quocirca Insights   |      Data breach, Data-security, MFP
Securing joined-up government: the UK's Public Service Network (PSN)

Blog   A common mantra of the New Labour administration that governed the UK from 1997 to 2007 (when the 'new' was all but dropped with the departure of Tony Blair), was that Britain must have more joined-up government. An initiative was kicked-off in 2007 to make this a digital reality with the launch of...

Last updated: Jun 29, 2015   8:04 AM GMT  |  Blog: Quocirca Insights   |      Uncategorized
How to deal with a remote code execution vulnerability

Blog  Visual Studio Code is a free source code editor developed by Microsoft for Windows, Max OS and Linux. On February 12, 2019 Symantec Security Center found a serious remote code execution vulnerability (CVE-2019-0728) in MS Visual Studio Code. This vulnerability ties into another one back in June of 2...

Last updated: Jun 10, 2019   3:31 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions   |      Uncategorized
Security concerns remain a drag on the internet of things

Blog  Concerns about security continue to hinder the adoption of IoT devices. Enterprise customers indeed are interested in buying more IoT devices, but only if vendors can provide better security for them. Bain & Company conducted research into the attitudes of enterprise buyers about cybersecurity ...

Last updated: Jun 20, 2019   2:57 PM GMT  |  Blog: IoT Agenda   |      built-in security, embedded security, Internet of Things
PREV 1...30   40   50...67   68   69   70   71   72   73   74   75   76...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: