Advertisements


How to minimize the risks of phishing scams

Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you an.....»»

Source:  NetworkworldCategory: Security10 min. ago Related News

Drunken man arrested for assaulting 300-lb. K5 security robot

So, you toss back a few drinks and decide now is the best time to “test” a 5-foot tall, 300-pound, egg-shaped security robot that is patrolling a Mountain View, California, parking lot. Although it might seem like a good idea when you are drun.....»»

Source:  NetworkworldCategory: Security10 min. ago Related News

IDG Contributor Network: Cyber crime as a service forces changes in information security

Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires deep technical knowledge. Just use Google to learn how to access the Dark Web, and y.....»»

Source:  NetworkworldCategory: Security10 min. ago Related News

Report: Top 25 IT security products

Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated.....»»

Source:  NetworkworldCategory: Security10 min. ago Related News

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by differ.....»»

Source:  NetworkworldCategory: Security10 min. ago Related News

IDG Contributor Network: MasterCard puts a finger on fraud

Most credit card verification systems only verify whether the card is valid and not if the presenter is the authorized cardholder. MasterCard intends to address that with its newly introduced card with a built-in fingerprint sensor.This new Master.....»»

Source:  NetworkworldCategory: Security10 min. ago Related News

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by differ.....»»

Source:  NetworkworldCategory: Security10 min. ago Related News

IDG Contributor Network: MasterCard puts a finger on fraud

Most credit card verification systems only verify whether the card is valid and not if the presenter is the authorized cardholder. MasterCard intends to address that with its newly introduced card with a built-in fingerprint sensor.This new Master.....»»

Source:  NetworkworldCategory: Security10 min. ago Related News

Ransomware attacks are taking a greater toll on victim"s wallets

The hackers spreading ransomware are getting greedier. In 2016, the average ransom demand to free computers hit with the infection rose to US$1,077, up from $294 the year before, according to security firm Symantec.“Attackers clearly think that.....»»

Source:  NetworkworldCategory: Security10 min. ago Related News

Submariners Give High Marks To New Steam Suit Prototype

Sailors from the Los Angeles-class attack submarine Toledo gave high marks in recent tests to the prototype steam suit protective gear they would use to... Sailors from the Los Angeles-class attack submarine Toledo gave high marks in recent tests.....»»

Source:  DefensetechCategory: Security2 hr. 30 min. ago Related News

87 Percent of Companies Plan to Invest in Security-as-a-Service in the Next 12 Months

40 percent expect their network security spending to increase by 10 to 20 percent over the next year, a recent survey found......»»

Source:  EsecurityplanetCategory: Security8 hr. 1 min. ago Related News

Thycotic Keeps a Close Eye on Privileged Accounts

A new feature in the company's Secret Server helps IT security teams detect suspicious behavior on high-value accounts......»»

Source:  EsecurityplanetCategory: Security14 hr. 9 min. ago Related News

At 95 Percent of Enterprises, Employees Are Actively Working to Bypass Security Protocols

The use of VPNs and other tools to bypass security restrictions doubled from 2015 to 2016, a recent survey found......»»

Source:  EsecurityplanetCategory: Security14 hr. 9 min. ago Related News

SAS Tackles the Cybersecurity Analytics Challenge

Cybersecurity analytics is far from perfect, so data analytics pioneer SAS is hoping its expertise can help make it easier......»»

Source:  EsecurityplanetCategory: Security14 hr. 9 min. ago Related News

86 Percent of Financial Services Firms to Increase Cyber Security Spend in 2017

That's far higher than 2016, when less than 60 percent said they planned to do so......»»

Source:  EsecurityplanetCategory: Security14 hr. 9 min. ago Related News

Twistlock 2.0 Sharpens Its Focus on Container Security and Compliance

Twistlock 2.0 offers improved security visibility into their application container environments and drives compliance......»»

Source:  EsecurityplanetCategory: Security14 hr. 9 min. ago Related News

Just 41 Percent of Enterprises Have a Consistent Encryption Strategy

And 37 percent turn over complete control of keys and encryption processes to cloud providers, a recent survey found......»»

Source:  EsecurityplanetCategory: Security14 hr. 9 min. ago Related News

Network Firewalls: How to Protect Your Network from Unauthorized Access

Network firewalls are easy to overlook, but they are an essential part of any security strategy. We cover the basics of network firewall technology and look at the latest in next-generation firewalls......»»

Source:  EsecurityplanetCategory: Security14 hr. 9 min. ago Related News

Shoney"s Restaurants, IHG Hotels Hit by Credit Card Breaches

Customer names, card numbers, expiration dates and verification codes were accessed by malware......»»

Source:  EsecurityplanetCategory: Security14 hr. 9 min. ago Related News

BlueCat DNS Edge Pounces on Insider Threats

BlueCat DNS Edge analyzes DNS data to detect suspicious behavior within enterprise networks......»»

Source:  EsecurityplanetCategory: Security14 hr. 9 min. ago Related News