Assessing and Managing Risk
Threats and Vulnerabilities
Threats evolve, so your mobile security must too. Learn how an app container, app wrapper and other tactics help keep bad guys away from corporate assets.
Nearly 10 million patient records have been posted for sale on a dark web market, putting the personally identifiable information of many at risk for abuse.
A raft of new Symantec and Norton antivirus vulnerabilities exposed by Google Project Zero are 'as bad as it gets,' according to Tavis Ormandy: RCE, no user interaction and wormable.
Malware can spread from one user to many through cloud synchronization. Expert Ed Moyle explains what enterprise users should know about their synchronization folders.
New Cloud Security Alliance research shows growing fatigue with security alerts and endpoint agents, as well as growing adoption of IaaS and positive signs for Microsoft Azure.
Enterprise cloud workloads can be better secured by using microsegmentation. Ed Moyle explains the best ways to plan and execute a segmentation strategy.
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.
WordPress is the most attacked web application and websites that run the content management system (CMS) are attacked 24% more often than those using alternative systems.
Apple has recently come under fire over the security of its customers' data, but the company has done a “nice job” using best practices to secure iTunes backups, according to a security researcher.
As Australian voters go to the polls this weekend, the future of the country's National Broadband Network is up in the air
Computer Weekly is conducting a salary and work mobility survey for IT professionals just like you. From the results, we are aiming to determine major trends of sector employment, either in terms of role, salaries, internal or geographical mobility.
Prosecution lawyer questions whether activist Lauri Love is not fit enough to stand trial in the US over hacking charges, as Love's legal team press for the case to be heard in the UK.