By Vic Hargrave Hey, Vic, my WordPress-based blog site on WebHosting hub was hacked on Sunday, Sep. 25. When I try to click on my “Dashboard” to add posts, I get the screen shown below. How can I recover my blog? This past weekend the hacker who calls himself Tiger-M@te and claims to be based…
Read More
With the adoption of any new technology comes the potential for misuse, and companies that overlook the importance of explicit governance and employee education may soon find themselves dealing with network meltdowns.
Read More
Organizations within the healthcare industry must take the Health Information Portability and Accountability Act into consideration whenever they deploy new technology, especially when it comees to cloud computing.
Read More
As business executives around the world begin to realize the vast potential of cloud computing, IT managers will have to move quickly to ensure data remains secure and the company stays compliant as it migrates to the new platform. As is often the case with innovative technologies, cloud security is lagging behind adoption rates. In…
Read More
According to industry expert Patrick Eijkenboom, cloud security fears may be misguided as a number of best practices are already emerging.
Read More
A new type of malware currently threatening banks in the U.S. and U.K. contains features highly reminiscent of the infamous Zeus Trojan, a Trusteer researcher recently revealed.
Read More
A recently released report from international marketing firm CPP Group has revealed that a surprising number of British citizens are engaging in casual computer hacking behavior.
Read More
As the global enterprise IT sector continues its shift toward the cloud, IT decision-makers have altered their hiring plans to focus more heavily on workers with training and experience in cloud computing.
Read MoreMEDIA ALERT: Cesare Garlati, Senior Director of Consumerization at Trend Micro, to reveal findings of the ‘Trend Micro Consumerization Report 2011’ at the Gartner Security & Risk Management Summit in London “Rather than resist it, organisations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and…
Read More
The public sector took center stage in the Internet security industry this week, with government news ranging from a win for the good guys with the arrest of a suspected LulzSec hacker to legislative efforts that suggest the federal government is getting over its security fears.
Read More