Security News
Edward Snowden Refuses to Use Apple’s iphone Over Spying Concerns
Edward Snowden reportedly believes that the iPhone contains "special software" that can be remotely activated by authorities for intelligence gathering purposes.
Edward Snowden: Cyber War More Damaging To US than Any Other Nation
The former NSA contractor sat down with NOVA to discuss why the US should allocate more resources to defensive maneuvering in cyberspace than towards offensive capabilities.
The Imperative for Effective Data Flow Governance in Response to Data Security
The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements - Understanding how managed file transfer and API management support changes in integration strategy.
‘Bring Your Own Internet of Things’ Coming To Businesses In 2015
So what technological marvels can we expect to see this year? Mark O’Neill, VP of innovation at Axway, provides his predictions for 2015, which include Bring Your Own Internet of Things, B2B in the cloud, and connected vehicles.
Managed File Transfer Mitigates Risk of Data Breaches & Non-Compliance Regulatory Mandates
Many IT leaders have so far failed to see the big picture and do not pay due attention to the need to govern the flow of data within, at, and beyond the edge of the enterprise.
Enterprise IT Insights for the Internet of Things
A timely reminder of the risks presented by the emerging IoT, what enterprise IT has done in the past to overcome similar issues, and how security approaches need to change to accommodate today's level of connectivity.
5 Ways to Gain end-to-end Visibility Across Data Flows
In any business interaction, data is a living, breathing thing. Whether it supports an order, a claim, or a payment transaction; represents your products and services; or actually is your product or service, every bit of information drives a business process lifecycle that has a beginning and an end.
Mobile Threats, Made to Measure
When it comes to malware, people who use trusted, mainstream app stores (as the bulk of users in the US and Western Europe do) are less likely to encounter malware.
Cyber Attacks Targeting Smartphone Supply Chains
A new mobile trojan dubbed “DeathRing” is being pre-loaded on to smartphones somewhere in the supply chain, warn researchers at mobile security firm Lookout.
Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
Regin is an extremely complex piece of software that can be customized with a wide range of different capabilities that can be deployed depending on the target.
Regin, a New Computer Spying Bug Discovered
The bug was probably created by a government and has been used for six years against a range of targets around the world and is one of the most sophisticated pieces of malicious software ever seen.
China Suspected of U.S. Postal Service Hack
The U.S. Postal Service said today it is the victim of a cyberattack and that information about its employees, including Social Security numbers, may have been compromised.
Anatomy of the Attack: Zombie Zero
TrapX 360 platform is uniquely positioned to detect, analyze, and report on Zero Day and APT threats in real time in a completely automated framework.
Malware Hidden In Chinese Inventory Scanners Targeting Logistics and Shipping Companies
TrapX discovers ‘Zombie Zero’ advanced persistent malware - Made in China; state sponsored attack targeting shipping and logistics industry worldwide.
The Supply Chain Silent Threat – Cyber Attack
High-value cyberspace attacks can change the status quo. Whether they involve stealing the blueprints for a new aircraft design or disrupting the supply of electrical power, all of them have one weakness in common – the supply chain.
Cloud Security Best Practices and Lessons for Business
The recent downtime experienced by Amazon E3 and Microsoft BPOS has created quite a buzz about the stability of cloud computing. Has your organization proactively made provisions and does it have cloud security best practices in place to protect your vital business data and processes in the event of a natural disaster?
Supply Chain Management is Vital to Modernizing Public-Private Security Operations
Supply chain managers have no peer in understanding the complexity of the global economic and regulatory environment. And, they are well positioned to expedite a cutting edge approach to public-private security cooperation.
Reducing Your Company’s Supply Chain Risk
Everyone seems to be aware of supply chain risks now in the aftermath of last year’s tsunami in Japan followed just six months later by heavy flooding in Thailand. The two natural disasters had a combined cost to global industries of nearly $230 billion. Worldwide, natural disasters cost $310 billion according to the insurer, Munich Re.
Crossing the Atlantic: Thoughts on our Series D Funding
Okta Secures $27 Million to Accelerate International Expansion - Sequoia Capital Leads Series D Round; Okta Appoints Philip Turner As New GM For European Operations.
More Evidence to the Ongoing Existence of Industry Global Supply Chain Risk
Global Supply Chain Risk Is Concentrated and Concealed in Sub-Tier Suppliers According to New Findings.
Featured Companies
HumanAI is a decentralized data exchange system that protects and monetizes personal data to enable global user-centric artificial intelligence.
Esri inspires and enables people to positively impact their future through a deeper, geographic understanding of the changing world around them. Esri has cultivated collaborative relationships with partners who share our commitment to solving Earth’s most pressing challenges with…
Infosys is a global leader in technology and consulting services. We enable clients in more than 50 countries to create and execute strategies for their digital transformation. From engineering to application development, knowledge management and business process management, we help our…
Ericsson is the driving force behind the Networked Society - a world leader in communications technology and services. Our long-term relationships with every major telecom operator in the world allow people, business and society to fulfill their potential and create…
When we first got started, smartphones barely existed– now there are more than a billion shipped each year and hundreds of millions in our enterprises. Before everything and everyone went mobile, we knew it was going to change computing forever.…
Youredi is the leading provider of data integration and analytics solutions as a service for global eCommerce, finance and logistics. With its simple, cost-effective iPaaS that can be delivered quickly and securely from the cloud and can compliment your existing…
As a technology staffing firm, we can’t think of a more fitting mantra. We’re extreme believers in technology and the incredible things it can do. But we know that behind every smart piece of software, every powerful processor,…
Bain & Company serves global clients on issues of strategy, operations, technology, organization, and mergers and acquisitions.
Axway is a market leader in governing the flow of data, is a global software and services company with more than 11,000 public- and private-sector customers in 100 countries. For more than a decade, Axway has empowered the world’s top organizations…
Salesforce is the Customer Success Platform. Our social and mobile cloud technologies—including our flagship sales and CRM applications - help companies connect with customers, partners, and employees in entirely new ways.
All Security Companies
All Companies