The challenges of setting up a security conference |
- The challenges of setting up a security conference
- GlobalSign reports CA infrastructure wasn't compromised
- Silent updating for Internet Explorer
- The rise of social media abuse and mobile malware
- Challenges facing critical infrastructure operators
- Security behavior and buying trends for 2012
- Users go to extreme measures for Internet access
- Security-hardened key management
- Syncplicity launches Security and Compliance Console
The challenges of setting up a security conference Posted: 15 Dec 2011 08:00 AM PST In this podcast recorded at the SecurityByte 2011 conference held this year in Bangalore, India, the conference founder Nishchal Bhalla talks about his motivations for organizing such an event in his ... |
GlobalSign reports CA infrastructure wasn't compromised Posted: 15 Dec 2011 06:35 AM PST When the self-styled ComodoHacker - who also claimed responsibility for the DigiNotar hack - boasted that he had access to GlobalSign's "entire server", database backups, system configuration files an... |
Silent updating for Internet Explorer Posted: 15 Dec 2011 06:27 AM PST Microsoft announced that in 2012 Internet Explorer will be updated "silently" to its newest possible version. This new silent update will eliminate the pop-up window that currently allows users to opt... |
The rise of social media abuse and mobile malware Posted: 15 Dec 2011 05:22 AM PST IID released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, the emergence of dangerous... |
Challenges facing critical infrastructure operators Posted: 15 Dec 2011 05:20 AM PST While critical infrastructure operators hold great responsibility for managing security, compliance and operations, many struggle to balance the resources required for each of these functions, accordi... |
Security behavior and buying trends for 2012 Posted: 15 Dec 2011 04:16 AM PST PCI data security standards may be a hot topic, but a recent survey by Gartner found that 18 percent of respondents admitted to not being PCI-compliant, even though the survey data suggested that they... |
Users go to extreme measures for Internet access Posted: 15 Dec 2011 04:04 AM PST Seven out of 10 young employees frequently ignore IT policies, and one in four is a victim of identity theft before the age of 30, according to a global study from Cisco. The findings reveal startl... |
Security-hardened key management Posted: 14 Dec 2011 11:00 PM PST Thales announced keyAuthority 3.0, combining high availability and hardened security to deliver a field-proven high assurance key manager. keyAuthority enables organizations to manage their ever-i... |
Syncplicity launches Security and Compliance Console Posted: 14 Dec 2011 10:57 PM PST With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where they happen, are autom... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment