Risk Management
-
Micro Focus suffers shares slump amid revenue fearsNews CEO Chris Hsu leaves as analyst points finger at HPE merger difficulties
By Jane McCallion Published
News -
Apple and Cisco tempt businesses with cybersecurity discountNews Kaspersky claims it sets a "worrying precedent" of insurance companies claiming to be better informed on security
By Dale Walker Published
News -
LinkedIn cannot block third-parties from data accessNews The ruling may have implications for social media users wishing to control how their data is collected
By Dale Walker Published
News -
Read Google's five rules for human-friendly AINews Google updates Asimov's Three Laws of Robotics for AI developers
By Aaron Lee Published
News -
Microsoft targets .NET Core with new bug bounty rewardsNews Redmond offers more cash prizes for sourcing errors in its upcoming web frameworks
By Aaron Lee Published
News -
Man who 'deleted company with one line of code' admits hoaxNews Marco Masala admits the story was a viral marketing ploy
By Aaron Lee Published
News -
Uber launches bug bounty programme with $10k prizeNews Keen bug tracers will need to find five genuine bugs to receive their first payout
By Aaron Lee Published
News -
‘Worst passwords’ list 2015 topped by 123456News Annual list of most commonly used passwords included Star Wars-related terms
By Aaron Lee Published
News -
Lumension takes the wraps off LEMSS 7.3News LEMSS 7.3 promises to protect against more pernicious attacks, such as RMI, says vendor.
By Jane McCallion Published
News -
Cryptzone CEO gives his account of the events that led toNews Security vendor's CEO denies challenges around acquisitions were factor in NETconsent's retreat.
By Jane McCallion Published
News -
Cambridge University boffins to combat rise of the machinesNews Scientists to look at ways to see off Terminator-style threat
By Rene Millman Published
News -
Data security: is breach mitigation all that's left?In-depth If you accept the premise that it's inevitable your enterprise network will be attacked, and most likely breached, then is mitigation really where the IT security focus should be? Davey Winder investigates...
By Davey Winder Published
In-depth