It’s time for corporate boards to take a role in setting security priorities and expectations, a report said, highlighting a set of security principals as a foundation to respond to the cyber security challenges of today’s world.
Red Hat and other makers of the widely used Linux operating system for business computers updated their software on Tuesday to thwart a serious new cyber threat they warned could allow hackers to gain remote control of their systems.
If 2014 was the “year of the breach,” then what future cyber security threats await us? What’s the next mode of attack, and how much worse will it be? Booz Allen Hamilton, a leading provider of management consulting
Targeted cyber attacks will become rampant in the Middle East, as hackers from the usual suspects have found success targeting victims around the world, a report said.
The annual security predictions report “Trend Micro Secu
McAfee, part of Intel Security, has announced the latest release of McAfee Next Generation Firewall, offering enterprises an expanded ecosystem of threat defence.
Important new integrations with the McAfee Security Connected frame
While Bahrain’s companies are innovating their future using the Internet, they face unprecedented risks the security chain caused by situations out of their control – from geopolitical events to natural disasters, said an industry ex
Despite broad recognition that cyber threats are more prevalent than ever before, more than one-third of companies are not adequately prepared to respond to a data breach or IT security crisis, a report said.
More than two-thirds
Mobile payments have been predicted to reach $1.3 trillion annually by 2017, while cyber threat to user data is also expected to increase, according to a report.
Cybercriminals have broadened their means of infection by targeting
Facebook usage in the Arab world has almost tripled in the last two years to reach over 45 million as of end June 2012 – about 50 per cent higher than the 37.4 million recorded six months earlier, a report said.
The first PC viruses appeared more than 25 years ago. Little did we realize that this was just the beginning of what would become a series of threat waves.
For nearly 10 years viruses endured as the primary method of attack, but o