2014 Archive

05-14-2014 – CRN – Sophos Phasing Out UTM Appliances

05-06-2014 – Sys-Con Media – CounterTack Named “Cool Vendor” by Gartner

05-01-2014 – Atlanta Black Star – Internet Explorer Gets Patch to Fix Security Issues

05-01-2014 – United Press International – Windows XP users included in Internet Explorer security patch

05-01-2014 – Mashable – Internet Explorer Gets Its Security Patch, and So Does Windows XP

05-01-2014 – Personal Liberty Digest – Windows XP Users Included In Internet Explorer Security Patch

04-30-2014 – Virtual Strategy Magazine – Dome9 Security Named a Cool Vendor by Gartner

04-24-2014 – Sys-Con Media – Agari Named “Cool Vendor” in Security for Technology and Service Providers by Gartner

04-22-2014 – CBR – 5 SECURITY VULNERABILITIES FOUND IN GOOGLE GLASS

04-21-2014 – Infosecurity Magazine – Baby Panda Goes After Jailbroken Apple iPhones

04-17-2014 – ChinaByte – 2014年的云计算:走向零信任安全模式

02-12-2014 – ITBusiness.ca – A look ahead at next week’s RSA conference

01-31-2014 – Live Mint – Yahoo identifies effort to break into users’ e-mail accounts

01-30-2014 – Bloomberg – Yahoo Identifies Effort to Break Into Users’ E-Mail Accounts

01-30-2014 – InventorSpot – Internet Of Things & Rise Of The Machines: Obsolescence Without A …

01-22-2014 – Wall Street Journal – BYOD? Leaving a Job Can Mean Losing Pictures of Grandma

01-15-2014 – New York Times – Tech Security Upstarts Enter Fray

01-15-2014 – Wall Street Journal – The Morning Download: CIOs Downgrade Cybersecurity

01-15-2014 – Cryptome – Bloated Security Firms Get Fatter on Hackers

01-09-2014 – Computerworld India – The NSA Blame Game: Singling out RSA Diverts Attention from Others

01-06-2014 – Wall St Journal – Gartner Forecasts 3.1% Growth in 2014 IT Spending

01-03-2014 – San Francisco Chronicle – Why hackers thrive during holiday season

01-03-2014 – Insurance Journal – Companies More Vulnerable to Cyber Breaches Around New Year

01-03-2014 – SC Magazine – New Year, New Threats

01-01-2014 – Computerworld Australia – Cloud computing 2014: Moving to a zero-trust security model

12-23-2013 – Computerworld Netherlands –‘Windows XP verdient nog een kans!’

12-23-2013 – Infosecurity Magazine – Jailbreak for Apple iOS 7 Released – But Beware

12-17-2013 – US wireless carriers force Samsung to hit the kill switch

12-15-2013 – San Francisco Chronicle – Wireless carriers oppose ‘kill switch’ on mobile devices

12-12-2013 – Wall St Journal – Tech Customers More Attentive to Security in the Wake of NSA Leaks

12-12-2013 – Businessweek – Samsung’s Antitheft Kill Switch for Mobile Devices Is DOA

07-15-2013 – IT World –Defcon founder’s message to feds fair to some, hypocritical to others

07-12-2013 – Computerworld Australia – Defcon founder’s message to feds fair to some, hypocritical to others

06-24-2013 – Chinese News Agency – The global security market will reach $ 86 billion

06-20-2013 – CNN Money – Tech is at a tipping point

06-12-2013 – Fierce Enterprise Communications – Poorly handled data breach could cost a CISO his or her job, warns Gartner

06-12-2013 – Computerworld Australia – Australian security market tipped to grow 12 per cent: Gartner

06-12-2013 – MSPMentor – Gartner: BYOD Driving IT Security Market Growth

06-12-2013 – ZDNet – Complexity, targeted attacks to drive security spend to $67B

06-11-2013 – Darkreading – Gartner: Worldwide Security Market To Grow 8.7 Percent In 2013

05-15-2013 – TechRadar – The advantages of unified threat management

05-15-2013 – GovTech – Who Controls the Internet?

04-18-2013 – Darkreading – Facebook vs. Salesforce: An Identity Smackdown?

04-10-2013 – TechWeekEurope – Search Engine Reveals Worrying Security Holes

04-09-2013 – eWeek – Shodan Search Engine Is Honestly Scary, but There’s Hope

03-28-2013 – TechTarget – IT pros must be responsible for cloud data security needs

03-24-2013 – PC Magazine – South Korea Attack Not From Chinese IP Address After All

03-22-2013 – Dark Reading – When Active Directory And LDAP Aren’t Enough

02-28-2013 – ABC News 10 – Security tools reveal cyberintruders’ trickery

02-28-2013 – USA Today – Security tools reveal cyberintruders’ trickery

02-20-2013 – Computerworld – China biggest, but not the only country engaged in cyberespionage

02-15-2013 – CSO Australia – Certificate authorities band together to boost security

02-08-2013 – ZDNet – Does jailbreaking or rooting devices, and BYOD mix?

02-05-2013 – Network World – ACLU takes wireless carriers to task for poor Android security

02-04-2013 – CSO Online – ACLU takes wireless carriers to task for poor Android security

02-04-2013 – Ashdown Group – Gartner: most sophisticated threats are ‘financially motivated’

02-03-2013 – PC World – Lessons from the hack attack on The New York Times

02-01-2013 – CSO Australia – Lesson learned in cyberattack on The New York Times

02-01-2013 – Money Morning – How the Pentagon Aims to Stop China’s Cyber-Hacking of America

02-01-2013 – Network World – Lesson learned in cyberattack on The New York Times

01-24-2013 – CRN – Are Managed Services The Best Way To Deliver Security?

01-23-2013 – Continuity Central – By 2016 public cloud infrastructure will be a mandated aspect of critical national infrastructure in the United States

01-23-2013 – Computer Business Review – Cloud based delivery to impact IT security application use in coming years: Gartner

01-23-2013 – Help Net Security – The cloud will impact the way security is consumed

01-22-2013 – Times of India – Cloud adoption to influence future security marketplaces: Gartner

01-22-2013 – CloudPro – Gartner: Cloud security growth to overtake on-premise by 2015

01-22-2013 – Digital Journal – Netpremacy Global Services Reveal 5 Cloud Computing Trends from Gartner and IDC That Will Shake Up and Shape 2013

01-21-2013 – IT shops use tokenization for mobile data security, SaaS apps

01-10-2013 – eSecurity Planet – How to Avoid a Hacktivist Attack


No tags for this post.

Leave a Reply

Advanced & Persistent Security

CLOSE
CLOSE