Bolting on security after the fact is always more costly, time consuming and less effective. 
                    
			            - By Martin   Zinaich 
 - Jul 29, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The devices can be hacked using a simple MMS message. 
                    
			            - By Matt  Holden
 - Jul 28, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    International Information Systems Security Certification Consortium of 1988 formed among several professional organizations to create a global information security certification process for professionals and address the need for standardized curriculum.
                    
			            - By Martin   Zinaich 
 - Jul 20, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    What does information security have in common with Eastern Air Lines Flight 401? It’s an odd question, with an important — and potentially tragic — answer. 
                    
			            - By Martin   Zinaich 
 - Jul 15, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Partnership will expand reach for Code Dx's software vulnerability management system to Europe.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Mozilla also disabled the web-enabled video software.
                    
			            - By Matt  Holden
 - Jul 15, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Credit monitoring and identity-theft protection offered to those affected. 
                    
			            - By Ginger  Hill
 - Jul 10, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Take into consideration the hackers' motivation, then develop a plan of action.
                    
			            - By Ginger  Hill
 - Jul 09, 2015
 
		            
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Increasing mobility of equipment raises new concerns of managing access and keeping data confidential. 
                    
			            - By Steve   Spatig 
 - Jul 08, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Flights were grounded nationwide due to a network connectivity issue.
                    
			            - By Matt  Holden
 - Jul 08, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The advantages of video surveillance are well known, but at times, the full value is realized only after a system is installed. 
                    
			            - By Francois  Wolf
 - Jul 01, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The researcher known as Mudge plans to start a non-profit devoted to software security.
                    
			            - By Matt  Holden
 - Jun 30, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Unified Secure Data Exchange Broker solution consolidates email, file, mobile and cloud data security.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Alex Stamos starts his new job as the company’s chief security officer.
                    
			            - By Matt  Holden
 - Jun 25, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Immix CC Enterprise Command Center Software completes integration with Perspective.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Banks such as HSBC and TD Bank are behind the times when it comes to protecting their digital assets.
                    
			            - By Matt  Holden
 - Jun 23, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Private information stored on the phone could easily be accessed.
                    
			            - By Matt  Holden
 - Jun 18, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Network contained internal discussions about trades, proprietary statistics and scouting reports. 
                    
			            - By Ginger  Hill
 - Jun 16, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Cute little pics could take the place of PIN codes.
                    
			            - By Ginger  Hill
 - Jun 15, 2015
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How security professionals can help kids and those who care for them stay safe.
                    
			            - By Ginger  Hill
 - Jun 12, 2015