You Are Browsing ‘Security ’ Category

Comments Off on Periscope Capital Inc. Lowers Position in FinTech Acquisition Corp II (FNTEU)
(Source: Week Herald) ... with particular emphasis on businesses that provide data processing; transactional and data security; rewards, loyalty, and consumer engagement platforms ......
Comments Off on Attackers Can Bypass SKEL Protection in macOS High Sierra
(Source: BleepingComputer) A new security feature added in macOS High Sierra (10.13) named "Secure Kernel Extension Loading" (SKEL) can be bypassed to allow the loading of ......
Comments Off on Mitigating Third Party Data Breach Risks
(Source: JD Supra (press release)) In its agreements with third parties, an organization should ensure that third parties are required to comply with certain data security and privacy practices that ......
Comments Off on Cyber talent gaps force IT security employers to hire creatively
(Source: HR Dive) A strong majority (93%) of IT security professionals in a new Tripwire survey say they're concerned about the industry's skills gap, and 72% believe it's more ......
Comments Off on Micro Focus Announces New Innovations In Its Expanded Security Portfolio
(Source: DATAQUEST) Micro Focus's comprehensive security solutions spanning security operations, application security, identity and access management (IAM), and data security ......
Comments Off on Silent Circle Acquires Kesala to Strengthen Data Protection for Global Business Operations
(Source: Cellular News) ... GoSilent is the primer necessary for Silent Circle to capitalize on serving a global business market entrenched in a constant battle to assure data security....
Comments Off on Avast and Aircel Partner to Provide Mobile and Data Security in India
(Source: Developing Telecoms) Our partnership with Avast is the most recent example of our commitment to provide the highest standards of data security solutions to our valued customers and ......
Comments Off on The New CISO: Management Through Thought Leadership
(Source: Security Intelligence (blog)) The success of today's IT security leaders depends on their thought leadership and ability to present a continuous flow of understandable and interesting ......
Comments Off on Deloitte urges organisations to be “Regulator Ready”
(Source: Independent Online) Other benefits include improved data security, including protection against cyber attacks such as ransomware and boosting the organisation's quality of ......
Comments Off on Symantec CIO describes changes in responsibility for IT and security
(Source: SiliconANGLE News (blog)) Chief Information Officer Sheila Jordan (pictured) is in a unique position as an information technology leader at a security company to offer perspective on her ......