Realizing the wide scope of fraud should be at the top of every business executive’s to-do list. Here’s some practical advice to help you stay safe. Fraud has a...
Read moreGrayshift, the company behind a system to help police break into iPhones, says it found a workaround for USB Restricted Mode. Hackers say they found a workaround for USB...
Read moreEmail, Social Media Still Security Nightmares
June 16 2018Phishing and banking trojans continue to be major threats brought into the enterprise. Users are going to click on sketchy links, download iffy files, and go to dangerous web...
Read moreAttacks directed at targets in Singapore went through the roof earlier this week. The recent meeting in Singapore between US President Donald Trump and North Korea’s Kim Jong Un...
Read moreThere are many factors to consider when making an application security purchasing decision, and the pressure is on organizations now more than ever to improve their security risk management...
Read moreVery few organizations have fully incorporated all relevant risks and threats into their current digital strategy, research finds. Today, all organizations are digital by default. However, it has never...
Read more10 ways CSOs can achieve ROI on a network solution
June 15 2018With the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies might have to...
Read moreNew European Parliament document calls out Kaspersky Lab software as ‘malicious’ and says it should be banned. Kaspersky Lab, in response to a resolution adopted by the European Parliament...
Read moreHow can CSOs protect their CEO?
June 15 2018A key component of being an executive is traveling (including visiting customers and attending conferences). Wireless networks, especially free ones, are prone to being spoofed as well as fake...
Read moreModerate severity Lazy FP restore flaw affects Intel Core-based microprocessors. Intel has disclosed another speculative execution side-channel vulnerability affecting many of its modern microprocessors that gives attackers a way...
Read more
Recent Comments