The Latest in IT Security

Posts Tagged ‘CISO’

The Onion Router (Tor) was designed to protect privacy and anonymity on the internet. However, it is increasingly being used by criminals to protect themselves and their endeavors. Last year Kaspersky Lab noted, “the cyber-criminal element is growing… We found Zeus with Tor capabilities, then we detected ChewBacca and finally we analyzed the first Tor Trojan for Android.”

Read more ...

If your information security function is like most, it develops copious amounts of data about the business’s security that it delivers on a regular basis. And typically it never gets read. “There’s a lack of collaboration between the two parties,” says Steve Durbin, managing director of the Information Security Forum (ISF), a nonprofit association that […]

Read more ...

At Black Hat USA 2014, Yahoo’s CISO announced in a presentation that consumers will be seeing end-to-end encryption in its Mail product by 2015.

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments