Security News
Edward Snowden: Cyber War More Damaging To US than Any Other Nation
The former NSA contractor sat down with NOVA to discuss why the US should allocate more resources to defensive maneuvering in cyberspace than towards offensive capabilities.
The Imperative for Effective Data Flow Governance in Response to Data Security
The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements - Understanding how managed file transfer and API management support changes in integration strategy.
‘Bring Your Own Internet of Things’ Coming To Businesses In 2015
So what technological marvels can we expect to see this year? Mark O’Neill, VP of innovation at Axway, provides his predictions for 2015, which include Bring Your Own Internet of Things, B2B in the cloud, and connected vehicles.
Managed File Transfer Mitigates Risk of Data Breaches & Non-Compliance Regulatory Mandates
Many IT leaders have so far failed to see the big picture and do not pay due attention to the need to govern the flow of data within, at, and beyond the edge of the enterprise.
Enterprise IT Insights for the Internet of Things
A timely reminder of the risks presented by the emerging IoT, what enterprise IT has done in the past to overcome similar issues, and how security approaches need to change to accommodate today's level of connectivity.
5 Ways to Gain end-to-end Visibility Across Data Flows
In any business interaction, data is a living, breathing thing. Whether it supports an order, a claim, or a payment transaction; represents your products and services; or actually is your product or service, every bit of information drives a business process lifecycle that has a beginning and an end.
Mobile Threats, Made to Measure
When it comes to malware, people who use trusted, mainstream app stores (as the bulk of users in the US and Western Europe do) are less likely to encounter malware.
Cyber Attacks Targeting Smartphone Supply Chains
A new mobile trojan dubbed “DeathRing” is being pre-loaded on to smartphones somewhere in the supply chain, warn researchers at mobile security firm Lookout.
Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
Regin is an extremely complex piece of software that can be customized with a wide range of different capabilities that can be deployed depending on the target.
Regin, a New Computer Spying Bug Discovered
The bug was probably created by a government and has been used for six years against a range of targets around the world and is one of the most sophisticated pieces of malicious software ever seen.
China Suspected of U.S. Postal Service Hack
The U.S. Postal Service said today it is the victim of a cyberattack and that information about its employees, including Social Security numbers, may have been compromised.
Anatomy of the Attack: Zombie Zero
TrapX 360 platform is uniquely positioned to detect, analyze, and report on Zero Day and APT threats in real time in a completely automated framework.
Malware Hidden In Chinese Inventory Scanners Targeting Logistics and Shipping Companies
TrapX discovers ‘Zombie Zero’ advanced persistent malware - Made in China; state sponsored attack targeting shipping and logistics industry worldwide.
The Supply Chain Silent Threat – Cyber Attack
High-value cyberspace attacks can change the status quo. Whether they involve stealing the blueprints for a new aircraft design or disrupting the supply of electrical power, all of them have one weakness in common – the supply chain.
Cloud Security Best Practices and Lessons for Business
The recent downtime experienced by Amazon E3 and Microsoft BPOS has created quite a buzz about the stability of cloud computing. Has your organization proactively made provisions and does it have cloud security best practices in place to protect your vital business data and processes in the event of a natural disaster?
Supply Chain Management is Vital to Modernizing Public-Private Security Operations
Supply chain managers have no peer in understanding the complexity of the global economic and regulatory environment. And, they are well positioned to expedite a cutting edge approach to public-private security cooperation.
Reducing Your Company’s Supply Chain Risk
Everyone seems to be aware of supply chain risks now in the aftermath of last year’s tsunami in Japan followed just six months later by heavy flooding in Thailand. The two natural disasters had a combined cost to global industries of nearly $230 billion. Worldwide, natural disasters cost $310 billion according to the insurer, Munich Re.
Crossing the Atlantic: Thoughts on our Series D Funding
Okta Secures $27 Million to Accelerate International Expansion - Sequoia Capital Leads Series D Round; Okta Appoints Philip Turner As New GM For European Operations.
More Evidence to the Ongoing Existence of Industry Global Supply Chain Risk
Global Supply Chain Risk Is Concentrated and Concealed in Sub-Tier Suppliers According to New Findings.
Supply Chain Risks: Barriers to Manufacturing in Emerging and Developing Markets
This report was originally tailored to the request of an electronics manufacturer, to explore emerging markets and the political and economic barriers to direct investment. The various business risks that influence supply chain risk as a whole are discussed.
Featured Companies
AlertMedia is the world’s leading emergency communication provider. Our award-winning, two-way multichannel messaging system, threat intelligence, and 24/7 employee safety solutions help organizations protect their people and business through all phases of an emergency. AlertMedia supports critical communication for thousands…
Ericsson is the driving force behind the Networked Society - a world leader in communications technology and services. Our long-term relationships with every major telecom operator in the world allow people, business and society to fulfill their potential and create…
Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions, and services. Approximately 155,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to…
Symantec Corporation is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings - anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks,…
World Wide Web Foundation
The World Wide Web Foundation was established in 2009 by Web inventor Sir Tim Berners-Lee to tackle the fundamental obstacles to realizing his vision of an open Web available, usable and valuable for everyone.
When we first got started, smartphones barely existed– now there are more than a billion shipped each year and hundreds of millions in our enterprises. Before everything and everyone went mobile, we knew it was going to change computing forever.…
Esri inspires and enables people to positively impact their future through a deeper, geographic understanding of the changing world around them. Esri has cultivated collaborative relationships with partners who share our commitment to solving Earth’s most pressing challenges with…
Founded in 1998, Tribridge is a leading IT services provider dedicated to helping customers leverage cloud and on-premise business solutions to become more productive, profitable, competitive and secure. Specializing in Microsoft Dynamics CRM and ERP, SharePoint and other essential productivity solutions,…
Dyn is a cloud-based Internet Performance Management (IPM) company that provides unrivaled visibility and control into cloud and public Internet resources. Dyn’s platform monitors, controls and optimizes applications and infrastructure through Data, Analytics, and Traffic Steering, ensuring traffic gets…
Salesforce is the Customer Success Platform. Our social and mobile cloud technologies—including our flagship sales and CRM applications - help companies connect with customers, partners, and employees in entirely new ways.
All Security Companies
All Companies