Security tagged posts

0

Top 5 Malware Threats

 When I wake up, the first thing I do is reach over for my smartphone and check for emails I might have received over night. During breakfast, I catch up on current events via my tablet...
Read More
0

9 Worst Cloud Security Threats

Leading cloud security group lists the “Notorious Nine” top threats to cloud computing in 2013; most are already known but defy 100% solution.

Shadow IT is a great thing until it runs into the security of cloud computing...

Read More
0

Cyber attacks force a defense strategy re-think

Cyber RE-Think

Cyber attacks force a defense strategy re-think

 2015-02-09 13:55
RELATED ARTICLES

Cyber security competition draws hackers

Hackers target Adobe Flash – again

SA firms take huge hit from hackers

Singapore – A barrage of damaging cyber...

Read More
0

The paranoid’s survival guide, part 2: Protect your privacy on social, mobile and more #Security

security-privacy

Here’s how to minimize your personal data footprint when messaging, on social media, and using mobile apps

Read More
0

The paranoid’s survival guide, part 1: How to protect your personal data #Security

security-privacy

Privacy is under attack from all quarters, but even today, there are things you can do to protect your personal data. Here are some tips.

Who says privacy is dead? While it’s true that mar...

Read More
0

2015 security predictions: IoT attacks to join cloud breaches and ransomware #Security

2015_cloud_Security

2015 security predictions: IoT attacks to join cloud breaches and ransomware

Summary:Think 2014 has been a bad year for security, with high-profile cloud breaches and system hacks? Well, things aren’t going to get any better in 2015.

By

Read More
0

8 Reasons to Fear Cloud Computing #Security

cloud-security

8 Reasons to Fear Cloud Computing

By 2014, cloud computing is expected to become a $150 billion industry...

Read More
0

Best practices for computer security via @insideUITS

Home Security

Best practices for computer security

This document details how you can secure your computer, accounts, and the data stored on them. Best Practices contains more technical security precautions that you should know, and that IT Pros should...

Read More
0

LinkedIn’s head security honcho shares his proactive security strategy, which begins with everyone buying in. #Security

Why Effective Computer Security Means Covering All Your Bases

By David Needle

LinkedIn’s head security honcho shares his proactive security strategy, which begins with everyone buying in.

PALO ALTO, Calif...

Read More
0

9 top threats to cloud computing security #Security

9 top threats to cloud computing security

Cloud computing has grabbed the spotlight at this year’s RSA Conference 2013 in San Francisco, with vendors aplenty hawking products and services that equip IT with controls to bring order to clo...

Read More