July 17, 2015 Added by:Alexander Polyakov
As all university networks are complex and consist of numerous modules and there are numerous vulnerabilities in them, protecting them seems a nightmare for any IT team. Cybersecurity is not some separate steps taking from time to time, but the ongoing process.
July 17, 2015 Added by:Rohit Sethi
While static analysis is a very valuable technology for secure development, it is clearly no substitute for building applications with security in mind from the start.
July 06, 2015 Added by:Steve Durbin
Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.
June 29, 2015 Added by:Shawn Masters
Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection
June 25, 2015 Added by:Eduard Kovacs
Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.
June 25, 2015 Added by:Malwarebytes
Dutch security firm Fox-IT has identified the payload as a new version of Tinba, a well-known banking piece of malware.
June 25, 2015 Added by:Tripwire Inc
In the beginning, there were stack buffer overflows everywhere.
June 25, 2015 Added by:Anton Chuvakin
As a security technologist you may be asked to do the impossible.
June 24, 2015 Added by:Brian Prince
Researchers at Tel Aviv University have demonstrated a method of stealing encryption keys from a PC using a radio receiver small enough to hide inside a piece of pita bread.