Your Search returned 1563 results from our Editorial content

Sort By

SECURITY

FBI reports more attempts to hack voter registration system...

The U.S. Federal Bureau of Investigation has found more attempts to hack the voter registration systems of states, ahead of national elections.

SECURITY

The Yahoo hackers weren't state-sponsored, a security firm...

Common criminals, not state-sponsored hackers, carried out the massive 2014 data breach that exposed information about millions of Yahoo user accounts, a security...

   

SECURITY

Six senators demand more details about the Yahoo data breach...

Six U.S. senators called Yahoo's belated discovery of a massive data breach "unacceptable," and they're demanding that the company provide more details.

SECURITY

Swift CEO reveals three more failed attacks on banking network...

Banks stopped three new attempts to abuse the Swift financial transfer network this summer, its CEO Gottfried Leibbrandt said Monday, as he announced Swift's plan...

   

SECURITY

Security blogger Krebs says IoT DDoS attack was payback...

Security blogger Brian Krebs says a massive DDoS attack that took down his Web site last week was likely the consequences for his outing of two Israelis who ran...

SECURITY

Your users have porous passwords? Blame yourself, IT.

Your efforts at raising security awareness could be making users feel that it’s pointless to try to protect themselves.

   

SECURITY

Singapore’s perplexing plan to cut off civil servants’ internet...

Is cutting off internet access really the best way to tackle security threats?

SECURITY

Yahoo's claim of 'state-sponsored' hackers meets with skepticism...

Yahoo has blamed its massive data breach on a "state-sponsored actor". But the company isn't saying why it arrived at that conclusion. Nor has it provided any evidence....

   

SECURITY

New Mac Trojan uses the Russian space program as a front...

Security researchers have found a new Mac OS X malware that appears to be targeting the aerospace industry.

SECURITY

Va. senator wants SEC probe of massive Yahoo breach

U.S. Sen. Mark Warner, D-Va., on Monday urged the U.S. Securities and Exchange Commission to investigate whether Yahoo met its legal obligations to keep the public...

   
   
Previous 1 3 4 5 156 157

Your Search returned 392 results from our White Paper Library

Sort By
McAfee

Managed Services

Secure in 15 — Start with Daily Practices

Get the Secure in 15 toolkit starting with the “15 Minutes Month-at-a-Glance” calendar. McAfee will send you additional tools and tricks to stay protected...


McAfee

Managed Services

McAfee Total Protection for Secure Business

Secure your business across systems, email, web, and data—all with one affordable solution created for the midsize organization.


McAfee

Managed Services

A Buyer’s Guide to Data Protection

Implementing data protection products and processes can be daunting. Make the right decisions by exploring what is available and what makes sense for your...


McAfee

Managed Services

Hands-On or Hosted Security: The Choice Is Yours

Do you manage security on premises or with Security-as-a-Service? Learn about the benefits of each approach, and get an overview of your options in this...


McAfee

Security

McAfee Email and Web Security Appliance Trial

15% better malware detection rate and 20% better spam and phishing catch rate—simply more effective than other filters. If that sounds like something you...


Meru Networks

WLAN

Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Altor Networks

Virtualization

Alternatives for Securing Virtual Networks

Discover the next generation security solution for the virtual environment. Check out how Altor VF monitors and controls inter-VM traffic, enforcing security...


Symantec Corporation

Security

Data Loss Risks During Downsizing

Are departing employees walking away with your company’s sensitive and confidential data?  In today’s economic environment a significant number of professionals...


Previous 1 3 4 5 39 40

Blogs

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Can technology save a post-Brexit Britain?

Jon Collins’ in-depth look at tech and society

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?