Apple has released an updated white paper covering security in iOS, going into an unprecedented amount of detail about the security architecture and features of the company’s mobile OS.
The official blog from Satisnet Ltd
Interesting infographic produced by Accelops. They asked IT executives who were attendees at Cloud Expo West about their priorities for 2014.
You’ve probably been hearing a lot about two factor authentication and the chances are you’ve come across the terms “OATH-compliant” and “Based on the OATH standards”.
Shavlik Protect 9.1 close to release, and Shavlik has shared some details about the release, which includes some useful enhancements and additions.
I was investigating strange behaviour back in November ’13, no, not MY strange behaviour – those who know me well will state quite clearly that my behaviour goes way beyond anything you’d want to investigate! No, this strange behaviour was repeated triggering of an API call from Thycotic’s Password Reset Server and verification provider ProxStop.
A recent Zscaler ThreatLabZ research blog post focused on analyzing a VBScript bot. This simple looking file, which was delivered as an attachment to a spam email message, proved to contain an effective and potentially highly damaging payload.
Security companies often use technical terms inconsistently, leading to some confusion. Sophos have produced a helpful article about what they mean by unified threat management (UTM) and next-gen firewalls (NGFW).
A survey by PhishMe Inc reveals UK office workers do not understand basic security threats and organisations are failing to provide adequate training to help identify them.
Operations Manager version 4.5 is out today, and VMTurbo has published a Knowledge Base article summarising the changes, together with full instructions on how to upgrade.
As we post more and more information about ourselves on sites such as LinkedIn and Facebook, scammers are finding more and more ways to steal not only our personal details, but also the company details of the organisations we work for.
Gigamon has announced a forthcoming application to generate and export NetFlow records from within the Visibility Fabric. As a part of the Applications Layer of the Unified Visibility Fabric architecture, the NetFlow Generation application will create NetFlow records, then send the information to one or multiple NetFlow collectors or analyzers.
Have you ever installed a Splunk Universal Forwarder and seen one or more of your Active Directory domain controllers have high CPU utilization as a result? Have you ever wondered how the Splunk Universal Forwarder translates the Security ID effortlessly into a real name you can read?
A new whitepaper from AirWatch outlines the six steps businesses should take to ensure a successful migration away from BlackBerry to devices on iOS, Android or Windows platforms.
Whether you are building a private cloud or deploying applications over a public cloud infrastructure, you will be using application delivery functionality such as load balancing to scale out application workloads.
Cyber security has become a top concern for businesses, organisations and consumers. Today’s adversaries are well financed and their threats are more advanced than ever, and legacy solutions are becoming increasingly ineffective.
The recently discovered Trojan.POSRAM is malware created specifically to target point-of-sale systems that process transactions in a retail environment with the goal of stealing credit card data.
Splunk has announced version 3.0 of the Splunk® App for Enterprise Security, which empowers security professionals to stalk cyberattackers. New visualisations enable advanced threat detection, resulting in a significant reduction in the time to incident discovery and response.