Search Results | Malware
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT
Sort by:  Most Relevant  |  Date
Who do you trust to rebuild confidence in the on-line world?

Blog   The Data Sharing Review from Richard Thomas and Mark Walport brings a breath of fresh air to a feotid debate. Now comes the campaign to prevent the recommendations from being obfuscated and watered down by those who do well out of the current confusion as well as those making se...

Last updated: Jul 15, 2008   10:00 AM GMT  |  Blog: When IT Meets Politics   |      Impersonation, malware
Self-policed e-paradise or a vigilante-ruled e-anarchy?

Blog   Over 20% of the population of the world and over 60% of that of the UK population now use the Internet to do business, learn or play. The proportion of criminals who use it to identify and exploit victims is at least similar.  So who is policing it - everyone or no-one?    Hund...

Last updated: Jul 6, 2008   9:29 AM GMT  |  Blog: When IT Meets Politics   |      ACPO, Cybercrime, e-crime
Internet of energy: Extracting value from data silos in utilities

Blog  In the industrial world, and specifically the energy sector, the amount of connected devices, sensors and machines is continuously growing, resulting in the internet of energy, or IoE. IoE can be broadly defined as the upgrading and automating of electricity infrastructures, making energy production...

Last updated: Aug 1, 2017   5:57 PM GMT  |  Blog: IoT Agenda   |      Artificial intelligence, Data Management, energy
Review: Google Nexus 7 tablet - is it ready to do business?

Blog   This is a guest post by Kane Fulton, editor and founder of online magazine SKRBBLR. Review: Google Nexus 7 (8GB, 159) / (16GB, 199) Google's own-brand Nexus 7 tablet, which is manufactured by Asus, retails with a competitive price point, houses impressive hardware and ships with the latest vers...

Last updated: Jul 30, 2012   1:20 PM GMT  |  Blog: Inspect-a-Gadget   |      Android, Apple, Google
Breach Detection, Breach Mitigation, & Incident Response

Blog   Breach disclosuresare hitting the news almost daily. Cryptolocker and other ransomware attacks are occurring at an alarming rate. IT executives and compliance personnel continue to be dismissed in the cleanup process. Organizations who have traditionally been lean on their security spend are now...

Last updated: Apr 5, 2016   4:48 PM GMT  |  Blog: Virtual CISO   |      Breach detection, breach notification, Incident response
Fun Hacking Salvaged Data Storage

Blog  Every few years, someone hits the papersor, in this day and age, the Internet by going out to eBay or Craigslist, buying a bunch of old computers, and checking out what data is still available on them. This year, it was Josh Frantz, a senior security consultant for Rapid7, a security firm, a...

Last updated: Mar 24, 2019   10:07 PM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      privacy, Security, Storage
Putting print security on the C-Level agenda

Blog  Data breaches are rarely out of the headlines and compliance pressure, such as the introduction of GDPR, means security remains high on the corporate agenda. Cyber threats and data breaches are no longer the sole domain of the IT department, they must be considered at board level as the repercussion...

Last updated: Feb 19, 2019   12:16 AM GMT  |  Blog: Quocirca Insights
Security operations is broken, and AI can fix it

Blog  Every day, it seems, we read headlines about a new data breach or cyberattack. Then we talk about how to improve cybersecurity to prevent similar attacks from happening in the future. Chief among the issues to address is a lack of security personnel to fill vacant positions: How can we improve secur...

Last updated: Jul 27, 2017   8:28 PM GMT  |  Blog: IoT Agenda   |      ai, Artificial intelligence, cybersecurity
IoT security: Trust is a must

Blog  IoT vulnerabilities continue to surface, causing confidence in the ability of manufacturers to deliver products that are secured by design to continue to erode. Already this year, several vulnerabilities have been exposed, including: Security flaws in smart cameras -- Researchers discovered vulne...

Last updated: Apr 26, 2018   4:51 PM GMT  |  Blog: IoT Agenda   |      Data-security, ECC, Encryption
Cloud connectivity and closed source: The Achilles heel of home IoT

Blog  We all know that the internet of things is finding its way into more and more of our daily lives. Few cars manufactured today arent pre-loaded with dozens of microcomputers and sensors, controlling everything from entertainment systems to exhaust emissions, for example. But the place where the te...

Last updated: Aug 4, 2016   2:25 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, iot security
Where is the first CTO turned CEO?

Blog  Where do CEOs come from? What roads led them to their exalted and all-powerful roles? In a world of sprinting technology, internet-enabled systems across every enterprise and increasing cybersecurity threats, this is an unexpected but existentially relevant question to ask. According to a recent Fo...

Last updated: Oct 30, 2017   6:18 PM GMT  |  Blog: IoT Agenda   |      CEO, CISO, CTO
The evolution of enterprise IoT and its security risks

Blog  The internet of things is changing the world as we know it, connecting devices to the internet to collect, transfer and exchange data. While IoT has been around for some time as part of Industry 4.0 and available in consumer products such as Fitbit, Nest and so forth, its applications in the enterpr...

Last updated: Nov 6, 2017   9:27 PM GMT  |  Blog: IoT Agenda   |      Access control, Cyberattacks, Enterprise IoT
How Serious a Problem is Hillary Clinton's Private E-mail System?

Blog  Weve written before about the notion of Politicians Behaving Badly by using personal email systems while they served in office. Now former Secretary of State Hillary Clinton is under fire. The New York Times broke the story on March 2, noting that in her time in office, Clinton used the email ac...

Last updated: Mar 10, 2015   2:38 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      Email, privacy, Security
Combating cyber-attacks against the financial community

Blog   This is a guest post by Bala Venkatramani, marketing manager at ManageEngine Password Manager Pro: News media in the U.S. are abuzz with stories about cyber-attacks on top banks as financial institutions emerge as the prime targets of cyber-criminals. Reports suggest that since September 2012, cy...

Last updated: Mar 15, 2013   5:35 PM GMT  |  Blog: The Security Detail
An Experience with HP Yields Appreciation for New Area of Risk

Blog   Ive been involved with various risks and manifestations of bad outcomes things such as breaches, malware, human error, exposures, loss and related protections and solutions for quite some time. However, I experienced something new to me - after all this time. I think readers will wan...

Last updated: Oct 26, 2011   8:34 PM GMT  |  Blog: The Business-Technology Weave
Healthcare plan = big bucks for VARs

Blog   While many VARs may not agree with the now-approved healthcare legislation, those with a healthcare bent see it as a potential goldmine. This according to one member of the SearchITChannel.com Advisory board. Here are the top five takeways from yesterday's quarterly advisory board call: 1: Bu...

Last updated: Mar 25, 2010   5:17 PM GMT  |  Blog: Channel Marker
Who trusts who in the on-line world and why?

Blog   During my recent bout of manflu, I tried to make sense of the morass of material on the current scale and nature of on-line malpractice and the reasons for the current erosion of confidence in the on-line world. My conclusion is that ...

Last updated: May 2, 2009   11:47 AM GMT  |  Blog: When IT Meets Politics
Time to say what we want from Government IT

Blog   FIPR has issued a call by Ideal Government for suggestions as to "what we want from government IT". yesterday I pointed out that those promoting on-line services commonly ignore the cost of the time we spend trying to access them. However, we need to do rather more tha...

Last updated: Dec 30, 2009   9:23 AM GMT  |  Blog: When IT Meets Politics   |      FIPR
Will the EU Cybersecurity Directive do more good than harm?

Blog   Cybersecurity is fashionable. Everyone must have an initiative: from the dozens of fragmented and competing schemes across the tribes of Whitehall, Washington or the Berlaymont , through the IGF and ITU, to the World Economic Forum at Davos. There may now be more international cyber co-ordinating i...

Last updated: Feb 25, 2013   1:45 PM GMT  |  Blog: When IT Meets Politics   |      cybersecurity, Davos, directive
Securing the perimeter with IoT begins and ends with the device

Blog  The internet of things has drawn the attention of the White House and Congress amid growing concerns about the woeful state of IoT connected device security, most recently demonstrated when Mirai malware spread across botnets. Indeed, the lack of security in IoT devices portends a brave new world. ...

Last updated: Jan 13, 2017   6:00 PM GMT  |  Blog: IoT Agenda   |      Authentication, Encryption, Internet of Things
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: