3d man - Tip 8 tips for improving enterprise security

Joomla patched for SQL injection vulnerability

The Joomla content management system recently received a security update to address a SQL injection vulnerability. The flaw enabled hackers...

March 10th, 2014 Nestor E. Arellano

Apple says fix for Mac encryption flaw coming soon

Following the release of a fix for a major security flaw in its iPhone and iPad mobile devices Apple Inc.,...

February 24th, 2014 Nestor E. Arellano

Unnecessary admin accounts behind malware risks

By being more discriminate in doling out administrator accounts, chief security officers (CSO) can significantly lower the risk of their...

February 20th, 2014 Nestor E. Arellano

Hackers likely stole 40 million credit card data: Target

Canadian shoppers in local Target store are likely letting out a sign of relief today as the American department store...

December 19th, 2013 Nestor E. Arellano

FINTRAC collecting more data on Canadians than needed

The Financial Transactions and Reports Analysis Centre of Canada (FINTRAC), the department responsible for monitoring bank accounts across the country...

October 25th, 2013 Nestor E. Arellano

Lack of regs, complacency why Canada lags in security: Vendor

Lack of regs, complacency why Canada lags in security: Vendor

(The author is Canada sales manager of Chicago-based Trustwave Inc. ) In our recent 2013 Global Security Report, out of the...

April 19th, 2013 Howard Solomon

Cloud computing frustrations surface

Cloud computing frustrations surface

Cloud computing users are shifting their focus from what the cloud offers to what it lacks. What it offers is...

April 9th, 2010 Patrick Thibodeau

fellow, Cutter Consortium

fellow, Cutter Consortium

The interconnectedness of our increasingly electronic economy poses business and security risks that together mandate new consciousness for responsible computing,...

July 4th, 2005 Cutter Consortium

Survey finds corporate IT still vulnerable

Survey finds corporate IT still vulnerable

Corporate information systems remain porous against cyber attacks, and many IS managers do not consider security practices and policies to...

November 21st, 2001 Brian Fonseca