IT security

New EU GDPR: An IT Security View - Part II

The GDPR requires that data controllers/owners implement DPIA where certain kinds of processing of PII may are likely to increase the risk to the …

GDPR

Emerging IT Security Technologies: 13 Categories, 26 Vendors

A rundown of some of the hottest security product areas, and vendors helping to shape them.<p>1 of 14<p>Looks like you've hit your article limit. Please or …

Information Security

Vietnamese IT security company claims to beat iPhone X’s Face ID using $150 mask

Vietnamese cybersecurity company Bkav has allegedly found a way to trick Face ID on Apple’s iPhone X.<p>The company released a YouTube video on November …

Face ID

Developing a Security Outsourcing Strategy That Really Works

Wednesday | 8:00am<p>Wednesday, November 29 | 8:00am - 9:00am<p>Breakfast<p>Wednesday, 8:00am - 9:00am<p><b>Location:</b> Business Hall<p><b>Session Type</b>: General …

Texas A&M

New study: SaaS-based IT Security Market Trends, Business Strategies and Opportunities 2025

Security as a Service is a computing model that is based on software as a service model which provides security services over the internet. It …

Cybersecurity

Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches

Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.<p>Organizations with …

Cybersecurity

Businesses switch to Gmail for ransomware and spear-phishing protection

IT security teams at Fortune 500, Global 2000 and mid-sized corporations spend way too much time combating spear-phishing and ransomware …

Cybersecurity

Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies

Today, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization …

Cybersecurity

SA's cyber security concerns mirror global trends

Paul Williams, country manager for Southern Africa at Fortinet.<p>The IT security concerns, challenges and investment by South African enterprises are …

Cybersecurity

How I Infiltrated a Fortune 500 Company with Social Engineering

Getting into the company proved surprisingly easy during a contest. Find out how to make your company better prepared for real-world attacks.<p>I …

Social Issues

Minnesota Names IT Security Director to Interim State CISO Post

Call, pictured at left, has been the director of information security for MNIT since September 2014 according to his LinkedIn profile, managing the …

Cybersecurity

CrowdStrike outlines expansion plans in APAC

Cyber security technology provider CrowdStrike plans to expand its footprint in the Asia-Pacific (APAC) region, an underserved market that is just …

Cybersecurity

1 in 5 IT security pros still use paper to track accounts and passwords

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. …

Cybersecurity

Virtual Reality Could Serve as a Cybersecurity Recruiting Tool

A recent study finds 74% of millennials and post-millennials agree VR use in cybersecurity tools may entice them into an IT security …

Cybersecurity

Embrace the Cyber Security-Physical Security Nexus

It's time for the IT security team and the physical security team to work together on a "cyber-physical" security strategy.<p>Most companies are aware …

Cybersecurity

Global CISOs Concerned About Business’ Cybersecurity Readiness

Research by the Ponemon Institute focusing on Chief Information Officers (CISO) worldwide has found worrying levels of business readiness for …

Cybersecurity

Keeping computers secure is becoming a nearly impossible task

• <b>Protecting yourself from a cyberattack is near impossible because there is no single security solution.</b>• <b><br>The best way to prevent a security breach is to keep up-to-date protection on all fronts.</b>• <b><br>The real longterm solution to cyberattacks is to demand that systems are designed using sound security</b> …

Cybersecurity

Ask a Security Expert: How to Pick an Antivirus

<b>Question:</b> <i>“What should organizations look for in an antivirus program?</i><p><i>-Jason Ballard, Sedona Technologies</i><p><b>Related:</b> Oracle Issues Emergency Fix For …

Information Security

Third-party cyber security failures cost businesses the most

Companies suffer the greatest damage as a result of cyber security incidents relating to their partners, according to research.<p>This is the finding of …

Cybersecurity

Healthcare Orgs in the Crosshairs: Ransomware Takes Aim

Criminals are using ransomware to extort big money from organizations of all sizes in all industries. But healthcare organizations are especially …

Cybersecurity

From the Medicine Cabinet to the Data Center – Snooping Is Still Snooping

We’ve all done it in one form or another. You go to a friend’s house for a party and you have to use the restroom. While you are there, you look …

Cybersecurity

How to Make Deception Part of Your Cybersecurity Defense Strategy

Wednesday | 8:00am<p>Wednesday, November 29 | 8:00am - 9:00am<p>Breakfast<p>Wednesday, 8:00am - 9:00am<p><b>Location:</b> Business Hall<p><b>Session Type</b>: General …

Texas A&M

The Future Of Connected Enterprise Security

The emergence of edge-computing, the expansion of hybrid-cloud environments, and the proliferation of connected critical infrastructure are notable …

Cybersecurity

Cybersecurity is a strategic issue, not just an IT investment | IT News Africa – Africa's Technology News Leader

November 9, 2017 • Opinion, Security, Southern Africa<p>Paul Williams Country Manager – SADC at Fortinet.<p>As organisations embark on their digital …

Cybersecurity

10 Steps for Stretching Your IT Security Budget

10/24/2017<br>02:00 PM<p>When the budget gods decline your request for an increase, here are 10 ways to stretch that dollar.<p>2 of 11<p>Interconnect the Security …

Information Security

34 new and notable Android games from the last week (10/25/17 - 10/31/17)

Article Contents<p>1 Games<p>1.1 Death Road to Canada<br>• 1.2 Sheltered<br>• 1.3 IT: Escape from Pennywise VR<br>• 1.4 Decap Attack Classic<br>• 1.5 DreamWorks Universe of …

Android News

Lack of Internal IT Security Expertise Requires Connected Threat Defense

There are many different factors that can impact a company’s overall security posture. Increasing sophistication on the part of cyber criminals, …

Cybersecurity

It's Time to Change the Cybersecurity Conversation

The IT security industry needs more balance between disclosure of threats and discussion of defense practices - and greater sharing of ideas<p>For more …

Cybersecurity

How to focus C-Suite attention on the issue of cyber security

With large-scale cyber attacks becoming increasingly common, having an effective defence strategy in place has never been more important. A big …

Cybersecurity

How to fix your IT security skills gap: 3 self-learning methods for developers

The higher education curricula available for IT and development professionals have significant gaps. Even the most educated in the community, …

Cybersecurity