Secure data encryption tunneling for Apple iOS

Secure data encryption tunneling for Apple iOS


Secure data encryption tunneling for Apple iOS

Posted: 05 Oct 2011 07:52 AM PDT

WatchGuard unveiled their new security technology designed for Apple iOS-enabled devices. Mobile users often need to connect to corporate resources from high-risk locations, such as a free public W...

SpyEye Trojan hijacks mobile SMS security for online fraud

Posted: 05 Oct 2011 06:11 AM PDT

A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step web-based attack that a...

Wi-Fi users live in a false sense of security

Posted: 05 Oct 2011 04:31 AM PDT

Wi-Fi users in the U.S. are confident that they are taking the right steps to protect themselves when using Wi-Fi devices. In fact, 97 percent of Wi-Fi users recently surveyed by Wakefield Research fo...

Best practices for fighting credit card theft

Posted: 05 Oct 2011 04:25 AM PDT

3Delta Systems issued a set of business best practices for protecting customer credit card account information and minimizing corporate exposure to online payment scams. 3DSI's tips consist of tr...

This is how Windows get infected with malware

Posted: 05 Oct 2011 04:07 AM PDT

When a Microsoft Windows machine gets infected by viruses/malware it does so mainly because users forget to update the Java JRE, Adobe Reader/Acrobat and Adobe Flash. This is revealed by a survey cond...

Stonesoft a2Cloud: Strong authentication for secure cloud access

Posted: 05 Oct 2011 03:48 AM PDT

Stonesoft announced its new a2Cloud solution which offers secure access to the cloud with usability, minimal administration and low total cost of ownership. a2Cloud delivers secured access to the c...

Data security for Microsoft SharePoint

Posted: 05 Oct 2011 03:42 AM PDT

Imperva announced SecureSphere for SharePoint, a data security solution to help businesses protect sensitive data stored in Microsoft SharePoint. The product addresses the unique security requirements...

ISACA issues COBIT process assessment model

Posted: 05 Oct 2011 03:30 AM PDT

Since COBIT was issued 15 years ago, enterprises worldwide have been using it to assess and improve their IT processes. However, until now there has not been a consistent and reliable assessment appro...

ISO 27001 documentation toolkit

Posted: 05 Oct 2011 03:00 AM PDT

Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better. Poorly written documents or missing documents ...

0 comments:

Post a Comment