You Are Browsing ‘Security ’ Category

Comments Off on IBM opens up QRadar APIs, launches security app exchange
(Source: ZDNet) IBM announced Tuesday plans to open up its QRadar analytics platform to in an effort to spur the development of securityapplications that can be used in the ......
Comments Off on Target Agrees to Pay $39.4 Million to Settle Data Breach Lawsuit Filed by Financial Institutions
(Source: Lexology) This bill, as envisioned by the NAFCU, would impose national data security measures on retailers and merchants (similar to those already imposed on credit ......
Comments Off on Chrome Security Update: Google Polishes Web Browser With New Fixes
(Source: Security Intelligence) Much of the new Chrome browser focuses on securityimprovements: Google paid out over $100,000 in bug bounties tosecurity researchers — both credited ......
Comments Off on Veracode Finds Most Web Apps Fail Owasp Security Check List
(Source: ComputerWeekly) Four out of five applications written in popular web scripting languages contain at least one of the critical risks in an industry-standard security benchmark, ......
Comments Off on Security Breach at Toy Maker VTech Includes Data on Children
(Source: New York Times) Troy Hunt, an Internet security expert, wrote this weekend that while adults were becoming accustomed to data breaches, compromising the identities of children ......
Comments Off on Securing America’s cyberfuture goal of new Cyber Security Institute
(Source: Communities Digital News) Cyber Monday shoppers may think about security risks online, but a new institute is tackling cyber security on a far bigger and more dangerous scale. The key to ......
Comments Off on Verizon PHI Data Breach Report Highlights Challenges Of Security
(Source: Health IT Outcomes) Healthcare has been grappling with the difficulty of maintaining the delicate balance of information access and security for a long time now, and the findings of ......
Comments Off on FTC Loses in LabMD Data Security Case: ALJ Sets High Bar for Consumer Harm
(Source: JD Supra ) an administrative law judge (“ALJ”) ruled against the Federal Trade Commission (“FTC”) in its high-profile data security case against ......
Comments Off on Dell Computers Have Another Terrible, Gaping Security Hole
(Source: Fortune) Dell's newest vulnerability, much like the previous one, involves the company installing a self-signed security certificate (a digital credential that authenticates ......
Comments Off on Ooredoo Qatar Data Centre receives ISO recertification
(Source: Gulf Times) Sheikh Nasser receives “recertification” of Qatar Data Centre's prestigious ISO 27001:2013 Information Security Management System (ISMS) in the presence of ......