The challenges of setting up a security conference

The challenges of setting up a security conference


The challenges of setting up a security conference

Posted: 15 Dec 2011 08:00 AM PST

In this podcast recorded at the SecurityByte 2011 conference held this year in Bangalore, India, the conference founder Nishchal Bhalla talks about his motivations for organizing such an event in his ...

GlobalSign reports CA infrastructure wasn't compromised

Posted: 15 Dec 2011 06:35 AM PST

When the self-styled ComodoHacker - who also claimed responsibility for the DigiNotar hack - boasted that he had access to GlobalSign's "entire server", database backups, system configuration files an...

Silent updating for Internet Explorer

Posted: 15 Dec 2011 06:27 AM PST

Microsoft announced that in 2012 Internet Explorer will be updated "silently" to its newest possible version. This new silent update will eliminate the pop-up window that currently allows users to opt...

The rise of social media abuse and mobile malware

Posted: 15 Dec 2011 05:22 AM PST

IID released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, the emergence of dangerous...

Challenges facing critical infrastructure operators

Posted: 15 Dec 2011 05:20 AM PST

While critical infrastructure operators hold great responsibility for managing security, compliance and operations, many struggle to balance the resources required for each of these functions, accordi...

Security behavior and buying trends for 2012

Posted: 15 Dec 2011 04:16 AM PST

PCI data security standards may be a hot topic, but a recent survey by Gartner found that 18 percent of respondents admitted to not being PCI-compliant, even though the survey data suggested that they...

Users go to extreme measures for Internet access

Posted: 15 Dec 2011 04:04 AM PST

Seven out of 10 young employees frequently ignore IT policies, and one in four is a victim of identity theft before the age of 30, according to a global study from Cisco. The findings reveal startl...

Security-hardened key management

Posted: 14 Dec 2011 11:00 PM PST

Thales announced keyAuthority 3.0, combining high availability and hardened security to deliver a field-proven high assurance key manager. keyAuthority enables organizations to manage their ever-i...

Syncplicity launches Security and Compliance Console

Posted: 14 Dec 2011 10:57 PM PST

With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where they happen, are autom...

0 comments:

Post a Comment