LockPath launches auditing tool
LockPath released Audit Manager as part of the latest version of its Keylight platform, which enhances the end-to-end internal audit process. Controls allow customers to scope …
Adobe updates app for e-signing documents
Adobe updated the Adobe EchoSign e-signing offering with an updated offline iOS app and other new features to enhance mobility and usability for e-signing contracts, …
Microsoft patches IE, Office and Windows
For Patch Tuesday this month, we are receiving critical updates from both Microsoft and Adobe. Microsoft has five bulletins, bringing the six-month total up to 51 bulletins, …
Obama, Verizon, NSA sued for collecting U.S. citizens’ phone call data
Three individuals have filed the first lawsuit aimed at disputing the constitutionality of NSA’s collection of metadata on phone calls made by or to U.S. citizens. Larry …
Reactions from the security community to the NSA spying scandal
Last week a whistleblower created quite the stir when he leaked documents about PRISM, a surveiilance program by the NSA. Below are comments on this scandal that Help Net …
Most enterprises have no information strategy
Less than 10 percent of today’s enterprises have a true information strategy, according to Gartner, Inc. Recent research by Gartner has found that, just as business …
ACLU asks spy court to release records on Patriot Act surveillance powers
The American Civil Liberties Union (ACLU) of Washington and Yale Law School’s Media Freedom and Information Clinic filed a motion on Monday with the secret court that …
IT consumerization still a threat
Despite the growing consumerisation of IT, the majority (63 per cent) of employees in the UK say that corporate IT is failing to secure all personal devices brought into the …
Washington Free Beacon website redirects to malware
A “big” story like that regarding NSA spying was bound to be used by cyber crooks as a lure. So far, no emails containing links to booby-trapped pages or malicious …
Researchers find self-propagating Zeus variant
The Zeus / Zbot Trojan has been around since 2007, and it and its variants continued to perform MitM attacks, log keystrokes and grab information entered in online forms. It …
How businesses prepare for disasters
With fears of potential security breaches and natural disasters like Superstorm Sandy and the recent Oklahoma tornado weighing heavily on IT executives, businesses nationwide …
Big data is a big priority
NGDATA shared the results of their survey executed in co-operation with Clear2Pay – sharing insights from 183 global bankers around issues like the monetization of …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades