Where do Cisco’s network security plans go from here?
FRAMINGHAM – Despite its leadership position in most enterprise security product areas, Cisco faces a number of technological and competitive challenges to stay out in front. For example, the...
View ArticleHow valuable are security certifications today?
FRAMINGHAM – When it comes to education, most people agree, more is better. No one embodies that principle — at least in regard to IT certifications — better than Jerry Irvine. CIO of IT consulting...
View ArticleTips to avoid becoming an identity theft victim
Kaspersky Lab, a developer of secure content and threat management solutions, urges the public to be more vigilant in protecting their personal details to prevent identity theft. Identity theft is an...
View ArticleTrend Micro warns business and organization users to be aware of a new...
Trend Micro Incorporated has exposed a new targeted attack campaign called “Safe” which compromised government ministries, technology firms, media outlets, academic institutions and non-governmental...
View ArticleIT execs urged to focus less on technology, more on business
IT executives must stop being so technology-focused and start talking with government leaders and politicians about data lost risks and cyber security. Noting that most IT people, particularly CIOs and...
View ArticleGov’t urged to put up customized defense to combat cyber attacks
Investing in anti-virus software is no longer enough to counter cyber attacks on vital data systems, especially if national security is at stake. This was what Trend Micro security experts said as they...
View ArticleLayered authentication solutions pushed to protect online and mobile banking...
HID Global, a global provider of secure identity solutions, continues its drive to help financial institutions secure online banking services that nearly half of all their customers prefer for...
View ArticleSecurity Response: Targeted Attacks Deliver Disassembled Malware
Shortcut files are fast becoming a common vehicle used in targeted attacks to deliver malware into organizations. Symantec has observed a variety of ways that shortcut files are being used to penetrate...
View ArticleSecurity 101: Protecting Your Email from DHAs
Spam has plagued email users since its inception. Users obtain a brand new email address only to be pummeled with spam and phishing campaigns, sometimes within a matter of hours. Without fail,...
View ArticleSecurity Response: Cynical Spammers Exploit Deepening Syria Crisis
As the international community coordinates its response to the deepening crisis in Syria, scammers have once again demonstrated their skill at using current, high-profile events to their advantage. We...
View Article
More Pages to Explore .....