CISO responsibilities: Commit comparison government to confidence governance
Despite an ongoing array of high-profile craving information breaches, a 2012 Carnegie Mellon CyLab Governance survey (.pdf) found CEOs and comparison executives are not tighten to being entirely...
View ArticleUsing a network to forestall an Oracle TNS Listener poison attack
Oracle Corp.’s doing of a zero-day disadvantage that led to a Oracle TNS Listener poison attack has confused many administrators and is heading them to doubt a confidence viewpoint they should take...
View ArticleSearchSecurity consult reveals tip 5 craving mobile confidence issues
Mobile malware might constraint a bulk of a news headlines per craving mobile security, but a hazard of information steam and device detriment and burglary might be only as, if not more, important....
View ArticleFive tips for rebuilding information confidence processes, culture
Security professionals are driven to broach improved processes to urge security, but enterprise users are infrequently boring or even antagonistic about changes to their daily work routines. We, as...
View ArticleH.264 vs Flash: Using a H.264 codec as a secure Flash alternative
Are there any confidence implications for Mozilla presumably ancillary a H.264 video codec in mobile versions of Firefox? Does H.264 lift any of a same risks as Flash that enemy can exploit, or is it...
View ArticleTechTarget UK sites folded into Computer Weekly
TechTarget‘s niche UK sites SearchStorage.co.uk, SearchVirtualDatacentre.co.uk, SearchDataManagement.co.uk and SearchSecurity.co.uk are being joined into Computer Weekly. Each subject formerly...
View ArticleHow to residence gTLD confidence as ICANN accepts some-more applications
It seems like there’s a new top-level domain (TLD) popping adult any time ICANN needs to fill a coffers. Now that there are so many potential Web addresses over .com, .net and a other standards, and...
View Article