Browse by Tags

  • Blog Post: Hot Topics in the Security Community – User convenience vs security, Wagamama security fiasco and child-proofing

    User convenience vs security Much conversation and RTs about user convenience should not related to security. Security should be main priority. (+0.5) The ultimate battle. One where both sides will always try to win. One of the most basic conundrums in computer security is the constant trade...
  • Blog Post: Businesses unable to count the cost of security breaches

    UK businesses are finding it difficult to count the cost of security breaches, a new study has revealed. Research commissioned by CipherCloud found that almost seven in ten (68 per cent) business decision makers are unable to estimate the cost of data loss. “Our research reveals some interesting...
  • Blog Post: Trustworthy Computing - Privacy in the Cloud

    A new generation of technology is transforming the world of computing. Advances in Internet-based data storage, processing, and services—collectively known as "cloud computing"—have emerged to complement the traditional model of running software and storing data on personal devices or on...
  • Blog Post: Human the weak link

    Humans: The weakest link in cyber security? You betcha? It appears that we’re treading on old ground – we are! But more and more and more emphasis needs to be put on security and, ultimately, humans. Rik Ferguson , Director Security Research and Communication The mass introduction...
  • Blog Post: Hot Topics in Security: Hague Warns us about Cybercrime, Free Security Tools for All and Mobile Devices Under Attack...Again

    What a Hague! (0) Drop everything. Literally everything. A foreign secretary is sticking his oar in and warning us about cybercrime . Is it a foreign crime? Things just got serious. He told delegates that cybercrime was “one of the greatest global and strategic challenges of our time”...
  • Blog Post: Hot Topics in Security: BYOD, Human weak link & BYOD again

    #ENISA #BYOD risk report published today (-1) Workplace IT? You got to love it! Last week ENISA published a detailed report covering the risks associated with the Bring Your Own Device (BYOD) trend to see opportunities and risks about applying the practice . Using own computers, phones, social...
  • Blog Post: Learn How to Protect Yourself From Counterfeit Software

    Guest post by David Finn Today as part of our third annual Consumer Action Day, Microsoft is releasing the results of a recent survey where we asked nearly 40,000 people in 20 countries how they feel about counterfeit software. The results show a growing tide of awareness about the problem, and...
  • Blog Post: Two-Factor Authentication

    As we reported earlier in the week; the most recent discussion around two-factor authentication was triggered by Dropbox adopting this secure methodology. Increasingly, it continues to be suggested that a password alone is not enough for security, especially each time a public case of account hacking...
  • Blog Post: Security is getting better

    Windows 8 is just fab isn’t? So many nice words and so useful. This blog may still be biased, but we just love it. Highlighted this week are just some of the security highlights available on the operating system. Windows 8 includes a number of new and improved security features. Not only is...
  • Blog Post: Businesses should not fear cloud computing security

    For businesses of all sizes, the implications of data loss can be extremely serious. In addition to the fines they can potentially incur, companies risk suffering irreparable reputational damage. Once a business has seen its security processes called into question, customers are likely to lose confidence...