Securing the enterprise: Insight from Qualys

Securing the enterprise: Insight from Qualys


Securing the enterprise: Insight from Qualys

Posted: 02 Mar 2011 11:00 AM PST

In this video, recorded at RSA Conference 2011 in San Francisco, Qualys Chairman and CEO Philippe Courtot talks about the myriad of innovations coming from the company:Next generation SaaS platform to...

Review: Building the Mobile Internet

Posted: 02 Mar 2011 10:27 AM PST

Authors: Mark Grayson, Kevin Shatzkamer and Klaas Wierenga Pages: 300 Publisher: Cisco Press ISBN: 1587142430 Introduction It is common knowledge that the world is going mobile, and that ...

Workers expose businesses to malware and data loss

Posted: 02 Mar 2011 10:10 AM PST

Organizations are at risk of malware as 76% of workers plug unknown USB flash drives into company PCs, potentially compromising corporate network security, according to BlockMaster. "This is alarmi...

Cybersecurity report on small business

Posted: 02 Mar 2011 09:49 AM PST

Small businesses rely heavily on the Internet to routinely handle confidential and proprietary data. Read this survey findings report to learn how to protect your business from the latest security ...

Rootcager Trojan found on the official Android market

Posted: 02 Mar 2011 07:23 AM PST

Free Android applications bundled up with malware have spilled over into the official Android marketplace. According to Symantec, the malware in question can root the phone, harvest data and open ...

Scam e-mails can now be forwarded to the police

Posted: 02 Mar 2011 06:15 AM PST

Action Fraud - the UK's national fraud reporting centre run by the governmental National Fraud Authority - has recently set up a dedicated e-mail address to which users are encouraged to forward every...

Twitter 11.6 hours survey scam spreading virally

Posted: 02 Mar 2011 05:13 AM PST

Twitter users should be vigilant following the outbreak of a scam that is spreading links from users' accounts without their knowledge. The scam, which has already caught thousands of Twitter users of...

The complex world of endpoint security

Posted: 02 Mar 2011 05:00 AM PST

Jeff Melnick is a Sales Engineer at NetWrix Corporation and in this interview discusses the intricate world of endpoint security, offers tips for IT security managers dealing with an influx of new dev...

PDF-Pro multiple vulnerabilities

Posted: 02 Mar 2011 02:18 AM PST

Several vulnerabilities in PDF-Pro can be exploited by malicious people to compromise a user's system, according to Secunia. 1. The application loads libraries (e.g. dwmapi.dll) in an insecure ma...

Man sentenced to 82 months for malware

Posted: 01 Mar 2011 09:38 PM PST

A 37 year-old New Hampshire man was sentenced in federal court for his role in an international computer hacking conspiracy and his failure to file income tax returns while living in Massachusetts. ...

0 comments:

Post a Comment