Dyman & Associates Risk Management Projects on Staff editorial: The internet, is it a p... - 1 views
image
Twenty years after it embraced the internet, China has become a cyber-giant, but a weak one vulnerable to a skyrocketing number of threats. Since China formally became a member of the global...
If your company has a Point of Sale (POS) terminal anywhere in its infrastructure, you are no doubt aware from the active media coverage that malware attacks have been plaguing POS systems across t...
A large percentage of the American population no longer trusts mainstream news outlets either on television or in print. A June 2013 Gallup poll indicates nearly 4 out of 5 Americans among younger ...
Target shoppers won't be the only ones who have had their personal information breached, says John Watters of iSight Partners. In business, when a customer of a company becomes an investor in the ...
Hackers have become very sophisticated over the past few years. Not only the recent attack on Target was tremendous, but it was also rather unusual because hackers attacked the company through thei...
Muscat: With the number of cybersecurity attacks increasing, regional and global cooperation is necessary to face the challenge, speakers at the third annual regional Cybersecurity Summit that open...
Auction site eBay has found itself in the midst of another security storm after apparently choosing to leave a security hole wide open - in the interests of user functionality - as customer details...
For most businesses, spreadsheets offer a simple way to perform key business functions, such as accounting, data analysis or chart creation. But many of the user-friendly advantages of spreadsheets...
Microsoft on Tuesday unveiled several upcoming Office 365 improvements, including mobile device management (MDM) and data loss protection (DLP) controls. The announcements were made during the Day...
Mobile Security Today, the whole globe is a virtual office and BYOD is a technique that enables every individual. Bring Your Own Device or Consumerization is the manner that many firms have opted ...
View Source: http://www.usatoday.com/story/tech/columnist/saltzman/2014/01/23/norton-mobile-security-devices-app-review/4800223/ Android is on track to surpass one billion users across all devices...
The White House on Wednesday released the first version of its cyber security framework for protecting critical infrastructure. Critics say these voluntary guidelines enshrine the status quo. The ...
http://www.cio-today.com/story.xhtml?story_id=021002JDEDBX Mobility. It's not a new trend, but it's a growing one. Indeed, the workforce is becoming increasingly mobile and that mobility is drivin...