What Six Sigma Has to Say About Reducing Failures
I spent most of my career at General Electric (GE), and was fortunate to grow my career when Jack Welch required aspiring managers to get a Six Sigma certification. This wasn’t always popular in IT,...
View ArticleDecoding Service for Audio-Skimmed Credit Card Data Offered in the Underground
A new service recently launched in the underground, offering cybercriminals to decode track 2 data (raw information of the magnetic stripe) that was captured in audio format by ATM skimmers. ATM...
View ArticleA Simple Lesson in Protecting yourself against Malware
We see the stories in the news each and everyday. Malware hit Android. Malware took advantage of known flaws in Windows. Source code was released for a new family of malware. The thing is … none of...
View Article“avast!, you little minx…”
Early Monday morning in the quiet AVAST Software headquarters office in Prague, we walked bleary-eyed to the coffee machine for our morning jolt. To our surprise, the peacefulness of the morning was...
View ArticleSprint 4G LTE Now Available in 15 Areas . Today’s #HPIO Mobility Matters...
Sprint 4G LTE Now Available in 15 Areas. Today's #HPIO Mobility Matters for +Esther Schindler... $SSprint 4G LTE Now Available in 15 Areas - Input Output
View ArticleSBN Sponsor Post
Webcast Replay: view our recent webcast, “Large Scale Cloud Forensics”.http://bit.ly/xOGmy0
View ArticleCyber Espionage: The Chinese Threat (Full Episode) CNBC
Cyber Espionage: The Chinese Threat (Full Episode) CNBC
View ArticleThere is a Roadmap to the Internet, and Having the Right One Counts!
The tale of DNSCHANGER ( 2+ yrs. in the making) has come to an end, criminal malware re-routing browser traffic in a profitable clickthru scam had its last vestiges die on July 9th. International law...
View ArticleOnline dating scam campaign currently circulating in the wild
By Dancho Danchev Lonely birds, beware! Russian online dating scammers are currently spamvertising a fraudulent campaign attempting to socially engineer users into interacting with a bogus online...
View ArticleNew Yahoo app vulnerability explains Android spam
After a Microsoft engineer claimed he discovered an Android botnet sending out spam from Yahoo accounts on an international scale, Google denied the allegations. Now a newly discovered vulnerability in...
View ArticleWhich browser is safest? The browser wars are back and this time you win
The upcoming releases of Internet Explorer 10, Firefox 14 and Chrome 21 are all fighting for our attention and using security as the reason why.
View ArticleIs the Law Unwittingly Creating a New Generation of Security Experts? #HPIO...
Is the Law Unwittingly Creating a New Generation of Security Experts? #HPIO UK for +HPUK by +Fernando Fonseca...Is the Law Unwittingly Creating a New Generation o... - Input Output
View ArticleTenable Network Security Podcast Episode 133 – "Detecting Mobile Device...
Welcome to the Tenable Network Security Podcast Episode 133 Announcements We're hiring! - Visit the Tenable website for more information about open positions. Check out our video channel on YouTube...
View ArticleDetecting Mobile Device Vulnerabilities Using Nessus
The Mobile Device Threat Without question the security of mobile devices is on the minds of almost every IT department. The average mobile worker carries 3.5 mobile devices at all times, a number that...
View ArticleLessons Learned from Humpty Dumpty
As the parent of a one-year old, I have found myself very well acquainted with nursery rhymes. From Sesame Street to the myriad of toys that my child owns, nursery rhymes are everywhere in my world....
View ArticleHow can I make sure my VPN is encrypted and working properly?
*Editor’s Note: These columns originally appeared in TechTarget’s SearchEnterpriseWan.com By Rainer Enders, CTO of Americas for NCP engineering The simplest way to do this is to act like a hacker....
View ArticleWebroot Bulletin Regarding AV-Comparatives Results
By Grayson Milbourne and Joe Jaroch If there is one thing that can be observed about the AV industry, it is that no solution is ever 100% effective at blocking malware. With this in mind, Webroot...
View ArticleSymantec Announces Mobile Security And Management Product Portfolio
Updates to enable secure mobile email deployments, mobile application initiatives, and Bring Your Own Device programs
View ArticleF5 Networks Announces Results For Third Quarter Of Fiscal 2012
Revenue up quarter-over-quarter and year-over-year
View Article