DailyTechNews.com - Tech News from over 70 leading sources!
About DailyTechNews
Contact Information
  
 Top News:  All Computer Weekly Content  - Latest IT News  - IT Hardware  - Enterprise Software  - IT Services and Outsourcing  - IT Security  - Networking and Communication  - Mobile Technology  - Internet Technology  - IT Management  - IT Careers and IT Skills  - Public Sector IT News  - Financial Services IT News 
 CNET News:  CNET News  - Android Atlas  - Apple  - Business Tech  - Dialed In  - Internet & Media  - Full Frame  - Fully Equipped  - Health Tech  - Microsoft  - Military Tech  - Molly Rants  - Politics and Law  - Security & Privacy  - Watch This  - Mobile 
 CNET Reviews:  Computer Systems  - Desktops  - Handheld Devices  - Digital Camcorders  - Cell Phones and Accessories  - Audio System Components  - Computer Peripherals  - Laptops  - Digital cameras  - Portable Audio Devices  - Video Players and Recorders  - Software  - Networking and Wi-Fi  - GPS  - Games and gear 
 Links:  Find any driver at DriverGuide.com  - Free tech email account

ComputerWeekly: IT security

RSAC17: Former MI5 head calls on infosec community to make world safer
Fri, 17 Feb 2017 06:15:51 EST
In a digital era, the information security community has a key role in helping to make the world a safer place, according to former MI5 boss Stella Rimington

Security Think Tank: Integrity of business data key to cyber defence
Fri, 17 Feb 2017 05:00:16 EST
What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks?

RSAC17: Geopolitical changes driving encryption usage, survey shows
Fri, 17 Feb 2017 04:45:55 EST
More organisations are planning to deploy encryption in response to geopolitical changes, but confidence in organisations’ ability to secure and protect encryption is low, a survey shows

Government is quietly asking suppliers to pick up the tab for cyber security
Thu, 16 Feb 2017 08:02:11 EST
The government's new approach to working with cyber security suppliers is bringing a shift in responsibility and risk to the private sector

Security Think Tank: Three strategies against data integrity attacks
Thu, 16 Feb 2017 05:00:25 EST
What type of organisations are likely to be targeted by data integrity breaches, and how best can they detect and mitigate against such attacks?

Security platforms to disrupt industry, predicts Palo Alto Networks
Thu, 16 Feb 2017 04:30:55 EST
Collaborative security platforms will enable developers to focus on innovation and force the security industry to change business models, predicts Palo Alto Networks

Too many high-risk vulnerabilities leave CISOs scrabbling to patch
Thu, 16 Feb 2017 04:00:51 EST
Too many critical flaws are given high priority, leading to a patch overload that CISOs cannot keep up with, according to F-Secure

RSAC17: More ransomware and IoT-enabled attacks on the way, warns expert
Thu, 16 Feb 2017 03:45:59 EST
Security expert Ed Skoudis says that in 2017 organisations need to prepare for evolving ransomware and IoT-enabled attacks, as well as a combination of the two

RSAC17: AI could help in IoT security, says Eric Schmidt
Wed, 15 Feb 2017 22:59:12 EST
Former Google chief says artificial intelligence could be applied in internet of things security, but the technology is still a long way from Hollywood scenarios

Security Think Tank: Data integrity attack could happen to any company
Wed, 15 Feb 2017 11:45:17 EST
What type of organisations are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks?

RSAC17: US politician calls for global collaboration on cyber defence
Wed, 15 Feb 2017 10:45:24 EST
Without greater collaboration, information sharing and clear sanctions against attackers, defenders will continue to lose the war in cyber space, says US politician Michael McCaul

Euroclear automates firewall rule management with AlgoSec
Wed, 15 Feb 2017 08:43:20 EST
Post-trade back-office process provider has made the management of firewalls more efficient through security management software

RSAC17: Infosec pros must help create business-driven security, says RSA CTO
Wed, 15 Feb 2017 05:30:27 EST
The inability to draw connections between security details and business metrics is one of the biggest challenges facing most companies, according to RSA CTO Zulfikar Ramzan

Anti-millennial recruitment stance will widen cyber security skills gap, experts warn
Wed, 15 Feb 2017 04:00:40 EST
Latest Global Information Security Workforce Study suggests infosec experts remain in short supply, and UK PLC’s reluctance to hire millennials means things are unlikely to improve

RSA17: Data manipulation next on attackers’ agenda, warns Intel Security
Wed, 15 Feb 2017 01:40:46 EST
Data manipulation a real threat and the next corporate attack vector could be found in the home, warns Intel Security head Chris Young

RSAC17: Cyber defence involves all levels of society, says Microsoft
Wed, 15 Feb 2017 01:05:50 EST
Microsoft calls for a global convention on cyber security and an independent organisation to keep nation state attackers in check

AWS preps GDPR readiness by signing up to cloud Code of Conduct
Tue, 14 Feb 2017 10:00:30 EST
AWS is now a member of the Association of Cloud Infrastructure Services Providers in Europe, which means EC2 and the like need to follow certain rules

Major DDoS attacks see huge increase, says Akamai
Tue, 14 Feb 2017 07:40:49 EST
Akamai’s State of the Internet/Security Report for the fourth quarter of 2016 finds that distributed denial of service attacks larger than 100Gbps are rapidly increasing as more IoT devices are compromised

National Cyber Security Centre officially opens for business
Tue, 14 Feb 2017 04:46:15 EST
The NCSC is at the forefront of the UK’s defence against cyber threats to critical national infrastructure and the digital economy

Security Think Tank: Data custodians likely to be top targets of integrity attacks
Mon, 13 Feb 2017 22:04:38 EST
What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks?

Copyright © 1998-2013 DailyTechNews.com All rights reserved.