The devices can be hacked using a simple MMS message.
- By Matt Holden
- Jul 28, 2015
International Information Systems Security Certification Consortium of 1988 formed among several professional organizations to create a global information security certification process for professionals and address the need for standardized curriculum.
- By Martin Zinaich
- Jul 20, 2015
What does information security have in common with Eastern Air Lines Flight 401? It’s an odd question, with an important — and potentially tragic — answer.
- By Martin Zinaich
- Jul 15, 2015
Partnership will expand reach for Code Dx's software vulnerability management system to Europe.
Mozilla also disabled the web-enabled video software.
- By Matt Holden
- Jul 15, 2015
Credit monitoring and identity-theft protection offered to those affected.
- By Ginger Hill
- Jul 10, 2015
Take into consideration the hackers' motivation, then develop a plan of action.
- By Ginger Hill
- Jul 09, 2015
Increasing mobility of equipment raises new concerns of managing access and keeping data confidential.
- By Steve Spatig
- Jul 08, 2015
Flights were grounded nationwide due to a network connectivity issue.
- By Matt Holden
- Jul 08, 2015
The advantages of video surveillance are well known, but at times, the full value is realized only after a system is installed.
- By Francois Wolf
- Jul 01, 2015
The researcher known as Mudge plans to start a non-profit devoted to software security.
- By Matt Holden
- Jun 30, 2015
Unified Secure Data Exchange Broker solution consolidates email, file, mobile and cloud data security.
Alex Stamos starts his new job as the company’s chief security officer.
- By Matt Holden
- Jun 25, 2015
Immix CC Enterprise Command Center Software completes integration with Perspective.
Banks such as HSBC and TD Bank are behind the times when it comes to protecting their digital assets.
- By Matt Holden
- Jun 23, 2015
Private information stored on the phone could easily be accessed.
- By Matt Holden
- Jun 18, 2015
Network contained internal discussions about trades, proprietary statistics and scouting reports.
- By Ginger Hill
- Jun 16, 2015
Cute little pics could take the place of PIN codes.
- By Ginger Hill
- Jun 15, 2015
How security professionals can help kids and those who care for them stay safe.
- By Ginger Hill
- Jun 12, 2015
The Obama administration a breach on government workers could affect up to four million citizens.
- By Matt Holden
- Jun 05, 2015