Your Search returned 1072 results from our Editorial content

Sort By

SECURITY

Shared malware code links SWIFT-related breaches at banks...

Malware links suggest that North Korean hackers might be behind recent attacks against several Asian banks, including the theft of $81 million from Bangladesh central...

SECURITY

Senate proposal to require encryption workarounds may be...

A proposal in the U.S. Senate to require smartphone OS developers and other tech vendors to break their own encryption at the request of law enforcement may be dead...

   

SECURITY

New JavaScript spam wave distributes Locky ransomware

Over the past week, computers throughout Europe have been hit by a massive email spam campaign carrying malicious JavaScript attachments that install the Locky ransomware...

SECURITY

Second-factor may prevent ATM fraud

Crooks stole $12.7 million from Japanese ATMs earlier this month but the theft could have been avoided, a security expert said, if ATMs accepting the old-style,...

   

SECURITY

Up to a dozen banks are reportedly investigating potential...

Up to 12 banks have reportedly launched investigations into potential security breaches on their networks after hackers stole $81 million from the Bangladesh central...

SECURITY

Euro agencies on encryption backdoors: Create 'decryption...

The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to go because of the collateral...

   

SECURITY

Senators want warrant protections for US email stored overseas...

A new bill in Congress would require U.S. law enforcement agencies to obtain court-ordered warrants before demanding the emails of the country's residents when they...

SECURITY

Celebrity hacker Guccifer's confession gives us all a lesson...

A Romanian hacker known online as Guccifer pleaded guilty to hacking into 100 email and social media accounts belonging to American citizens, including former high-ranking...

   

SECURITY

Google alums rollout Simility fraud-detection platform

A team from Google’s fraud-detection group has started up its own software as a service venture for spotting transaction fraud quickly based on rule sets but that...

SECURITY

IoT security is getting its own crash tests

The thousands of endpoints in IoT systems may have to protect themselves against thousands of dangers. A decades-old IT lab wants to tell you if they’re up to the...

   
   
Previous 1 3 4 5 107 108

Your Search returned 304 results from our White Paper Library

Sort By
McAfee

Managed Services

Secure in 15 — Start with Daily Practices

Get the Secure in 15 toolkit starting with the “15 Minutes Month-at-a-Glance” calendar. McAfee will send you additional tools and tricks to stay protected...


McAfee

Managed Services

McAfee Total Protection for Secure Business

Secure your business across systems, email, web, and data—all with one affordable solution created for the midsize organization.


McAfee

Managed Services

A Buyer’s Guide to Data Protection

Implementing data protection products and processes can be daunting. Make the right decisions by exploring what is available and what makes sense for your...


McAfee

Managed Services

Hands-On or Hosted Security: The Choice Is Yours

Do you manage security on premises or with Security-as-a-Service? Learn about the benefits of each approach, and get an overview of your options in this...


McAfee

Security

McAfee Email and Web Security Appliance Trial

15% better malware detection rate and 20% better spam and phishing catch rate—simply more effective than other filters. If that sounds like something you...


Meru Networks

WLAN

Security: Multiple Lines of Defense

To understand the unique vulnerabilities of wireless networks, it is necessary to analyze threats from the enterprise perspective. Wireless security vulnerabilities...


Admit One Security

Security

Eliminating Costs of Strong Authentication for Juniper SSL...

Minimizing the Costs of Strong Authentication for Juniper SSL VPN's.  Hear industry experts break down the authentication challenges that organizations...


Altor Networks

Virtualization

Alternatives for Securing Virtual Networks

Discover the next generation security solution for the virtual environment. Check out how Altor VF monitors and controls inter-VM traffic, enforcing security...


Symantec Corporation

Security

Data Loss Risks During Downsizing

Are departing employees walking away with your company’s sensitive and confidential data?  In today’s economic environment a significant number of professionals...


Previous 1 3 4 5 30 31

Blogs

mark-chillingworth

CIO Watch

DevOps is a CIO’s theory of evolution

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Bitcoin anonymity advocates ignore a darker truth

Jon Collins’ in-depth look at tech and society

Most Recent Comments

no-image

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Would a Brexit be bad for UK tech?