Security News

Implementing an effective risk management framework (Help Net Security)
2015-03-25 08:36

In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new risk. Legal systems worldwide a...

Mobile apps are not being tested for insecure behavior (Help Net Security)
2015-03-25 08:20

Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors to ensure proper enforce...

One in three top Alexa websites is risky (Help Net Security)
2015-03-25 08:07

Based on an analysis of the Alexa top one million sites, Menlo Security found that more than one in three of the top domains are either already compromised or running vulnerable software. In tota...

Organizations have little control over privileged access (Help Net Security)
2015-03-25 07:53

Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated they have no controls in p...

The marriage between DevOps & SecOps
2015-03-25 07:23

http://www.idgconnect.com/blog-abstract/9656/the-marriage-devops-secops By IDG Connect March 24 2015

Stealing Data From Computers Using Heat
2015-03-25 07:23

http://www.wired.com/2015/03/stealing-data-computers-using-heat/ By Kim Zetter Security Wired.com 03.23.15

A million hacks a day, but Israel’s elec	tric grid survives
2015-03-25 07:23

http://www.timesofisrael.com/a-million-hacks-a-day-but-israels-electric-grid-survives/ By David Shamah Times of Israel March 24, 2015