Recent global events have once again shown that our world is becoming more violent, with deaths from conflict and terror attacks on the rise. However, public discourse largely neglects the concept of personal situational awareness and self-preparedness in the event of an attack – be it terror or otherwise. Read More ▶ |
|
| Research/Infographic: ITS Partners Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More ▶ | The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks. Read More ▶ |
| HP is having a spring sale, and they've discounted the LaserJet Enterprise M506dh Printer by a whopping $1,100 if you use their special code between now and 3/31. Read More ▶ |
| Those on staff who are doing the budgeting might blindly write the same amount into the security line every year. Or the C-suite might handcuff the security personnel with a tight budget that doesn’t allow for expansion into new security products. How can this be counteracted? Read More ▶ |
| | Criminal gangs are turning over millions from breaching businesses - but the organisations with the biggest budgets are the intelligence agencies of nation states. How seriously should your organisation take cyber espionage? Computerworld UK speaks with Jarno Niemela, senior security researcher at F-Secure. Read More ▶ |
| There are a number of things that decision makers can do to protect their companies and minimize, if not eliminate, the threat of employee theft of sensitive and confidential information. Read More ▶ |
| Hackers claiming to have hundreds of millions of iCloud credentials have threatened to wipe date from iPhones, iPads and Macs. Read More ▶ |
| A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000. Read More ▶ |
| Research/Infographic: ITS Partners Most everyone knows that as cloud adoption increases, the maturity of cloud security must also increase. But, before investing in the latest and greatest tools, we always recommend that CISOs start by defining what outcomes are important to them - defining what they want their cloud security system to accomplish. Download the infographic to uncover and evaluate the 11 critical outcomes you will need from your cloud defense solution. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|