Bad Data Handbook
What is bad data? Some people consider it a technical phenomenon, like missing values or malformed records, but bad data includes a lot more. In the Bad Data Handbook, data …
IT GRC auditor outlines trends for the new year
As the new year kicks off, Coalfire, an independent IT GRC auditor, compiled their predictions for cybersecurity in 2013. “Last year was a very active year in the …
Worldwide IT spending to reach $3.7 trillion in 2013
Worldwide IT spending is projected to total $3.7 trillion in 2013, a 4.2 percent increase from 2012 spending of $3.6 trillion, according to the latest forecast by Gartner. The …
Ubuntu comes to the phone
Canonical announced a smartphone interface for its operating system, Ubuntu, using all four edges of the screen for a more immersive experience. Ubuntu gives handset OEMs and …
IE zero-day used in targeted watering hole attacks
News that an Internet Explorer zero-day vulnerability was being and has been for quite some time been used in a new “watering hole” attack has livened the …
The threat landscape continues to expand rapidly
ThreatMetrix announced cybersecurity trends and risks businesses and consumers must keep top of mind in 2013. These include cyberwarfare, data breaches, migrating malware, …
Database hacking: The year that was
Have you ever been to the Privacy Rights Clearinghouse site? It tallies all the data breaches that have occurred in United States since 2005. What you read there is really …
Trends in mobile ransomware, large-scale attacks and hacktivism
McAfee today released its annual 2013 Threat Predictions report, highlighting the top threats McAfee Labs foresees for 2013. In the coming year, McAfee Labs expects that …
Most unique viruses of 2012
PandaLabs outlined its picks for the most unique viruses of the past year. Rather than a ranking of the most widespread viruses, or those that have caused most infections, …
Only 8% of UK organizations have BYOD policies in place
As enhanced efficiency, employee productivity and the reduced burden on IT teams continue to drive adoption of Bring Your Own Device (BYOD), a recent survey of more than 500 …
Top 10 risks found by your auditor
KirkpatrickPrice offers a list of the most common risks they find. 1. No formal policies and procedures Formal guidelines of policies and procedures help provide your …
Top 10 telecom trends for 2013
MDSL published its Top 10 Telecom Trends for 2013. 1. TEM, MDM and MAM market: further consolidation to come 2012 saw a raft of acquisitions, driven mainly by Tangoe burning …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC