There was probably a time in your career when you were the only person in the company who had heard the term “the cloud,” let alone had any idea of how it works. But two new surveys show the problem might now be that everyone outside of IT feels like they know it all when […]
IT Security News
IT security news and insights to keep your data and infrastructure safe. Learn the latest strategies and best practices to protect against viruses, hackers, and disasters.
The OpenSSL library, a cryptographic service for up to two-thirds of the web, has recently patched a serious and far reaching vulnerability that could allow a hacker to snoop on your files completely undetected.
Target’s data breach has a lot of folks wondering: How much would a major cyber incident cost our organization? And are there any ways we could drastically cut the costs of a fallout? Unfortunately, the answers might be: a lot, and don’t count on it.
Nearly a fifth of corporate IT budgets is going to security. And many IT decision-makers are expecting to spend even more in coming years. But according to a recent survey, they still don’t feel that’s enough to protect them from attacks.
There are some basic rules for mobile security that have long been thought to keep you in the clear. But researchers have discovered these rules might not be able to protect Android devices from “pileup” malware.
What’s the cost of a few stolen laptops? Try $3 million, thanks to a controversial data breach settlement.
We probably shouldn’t be surprised that hackers and hoaxers are already using the disappearance of Malaysian Airlines flight MH370 to spread malware and steal information.
A recent lawsuit shows that when it comes to protecting your systems, IT might not receive much help through legal avenues. In this case, former employees stole data, but the lawsuit against them had to be thrown out because it relies on a very old law.
You probably give users advice on avoiding mobile malware. But there’s some bad news: Some of them could have phones that are infected through no fault of their own.
IT pros have to master a variety of skills. But one that you definitely didn’t sign up for is hostage negotiations. Unfortunately, it looks like that might be yet another task thrown at you.