Cloudy Skies Ahead for the Oversharer
It is ironic that no tech topic is as befuddling to people as the cloud, and yet in reality most of us use it in some form or another many times a day, via all the various apps and services […]
It is ironic that no tech topic is as befuddling to people as the cloud, and yet in reality most of us use it in some form or another many times a day, via all the various apps and services […]
Time Inc. confirmed just before the Memorial Day weekend that data was compromised from the MySpace social network. The company issued a statement that the compromised data is limited to MySpace usernames, passwords and email addresses from an old version
Attackers may be in your network right now. It sometimes takes weeks or months for an organization to detect a compromise while the attacker takes his or her time conducting recon on your network, spreading to different endpoints and servers,
Detect a Compromise Before You Become the Next Data Breach Headline Read More »
The success of a phishing attack is essentially a function of just how authentic it looks. Security researchers at Barracuda have encountered a new phishing attack that targets Facebook business pages by posing as a Facebook compliance message that appears
Apple’s QuickTime for Windows has two critical vulnerabilities that could allow an attacker to exploit your PC with relative ease. Apple knows about these flaws, but it has no intention of doing anything about them. Instead, Apple confirmed that it
One of the most important aspects of an IT security professional is being able to not only have a strong password, but also teach others in your company to follow this same password making process as well. You are only
Hey, iOS users. Let me ask you a question. Do you use the Touch ID fingerprint scanner to access your iPhone or iPad? Actually, anyone with a PC or mobile device that offers biometric security–fingerprint scanning, facial recognition, etc.–do you
Convenience of Biometric Security Is Better than Nothing Read More »
Let’s wrap up the week of commentary and insights from this year’s RSA Conference with a discussion of the marketing hype and buzzwords. Vendors attend RSA and spend tons of money on booth space so they can share their brand
Cutting Through the RSA Conference Hype and Buzzwords Read More »
Every year at the RSA Conference hundreds—maybe thousands—of security vendors crowd into the Moscone Center in San Francisco with claims that their products or services are better. “Better” is a relative measure, but generally speaking the assertion is either that
All of Your Security Is Broken, Please Buy Our Security Read More »
The simple fact is that the traditional security model is broken. The good news is that there are plenty of hungry security startups out there with innovative solutions to transform the way we secure and protect our networks and data.
Investors Pour Money Into Next-Generation Security Companies Read More »