Category: News

The best identity management advice right now

Identity is the only security boundary that has ever mattered in computer security defense. Physical boundaries, firewall boundaries, security domains, forests, realms and virtual networks… none of those matter if a single logon credential that can access multiple domains is …

Successful Security? Stop Blaming Users

Experts Offer Insights on Gaining Information Security Buy-In To encourage individuals to improve their security practices, begin by not blaming them. That was one takeaway from security experts at the Infosecurity Europe conference, who offered practical tips for changing user …

CEOs’ risky behaviors compromise security

When business decision makers decide to circumvent security controls, they typically are trying to gain operational efficiency, not put the organization at risk. But even when done with good intention, they are creating risk.  A recent study by Code42 found that CEOs are the …

Soldiers fend off tank assault with cyber, EW

A simulated tank assault was deterred using cyber weapons and electronic warfare technology during a training exercise, according to Defense Systems. Trainers stopped a simulated assault by targeting the tank crew’s radio and communication systems during the exercise at the Army’s …

Kaspersky Files Antitrust Complaints Against Microsoft

Microsoft Squeezes Out Third-Party Anti-Virus Products, Complaints Claim Russian anti-virus vendor Kaspersky Lab has filed two antitrust complaints against Microsoft in Europe, contending that the company has engineered Windows 10 to favor its preinstalled malware-fighting program, Windows Defender. The complaints …

Europe seeks quick access to user data

Police forces across Europe could get data from net firms almost immediately under new European Commission plans. The proposals aim to help police act quickly in the wake of terror attacks to round up collaborators and suspects. One option would …