Risk Management
-
Micro Focus suffers shares slump amid revenue fears
News CEO Chris Hsu leaves as analyst points finger at HPE merger difficulties
By Jane McCallion Published
News -
Apple and Cisco tempt businesses with cybersecurity discount
News Kaspersky claims it sets a "worrying precedent" of insurance companies claiming to be better informed on security
By Dale Walker Published
News -
LinkedIn cannot block third-parties from data access
News The ruling may have implications for social media users wishing to control how their data is collected
By Dale Walker Published
News -
Read Google's five rules for human-friendly AI
News Google updates Asimov's Three Laws of Robotics for AI developers
By Aaron Lee Published
News -
Microsoft targets .NET Core with new bug bounty rewards
News Redmond offers more cash prizes for sourcing errors in its upcoming web frameworks
By Aaron Lee Published
News -
Man who 'deleted company with one line of code' admits hoax
News Marco Masala admits the story was a viral marketing ploy
By Aaron Lee Published
News -
Uber launches bug bounty programme with $10k prize
News Keen bug tracers will need to find five genuine bugs to receive their first payout
By Aaron Lee Published
News -
‘Worst passwords’ list 2015 topped by 123456
News Annual list of most commonly used passwords included Star Wars-related terms
By Aaron Lee Published
News -
Lumension takes the wraps off LEMSS 7.3
News LEMSS 7.3 promises to protect against more pernicious attacks, such as RMI, says vendor.
By Jane McCallion Published
News -
Cryptzone CEO gives his account of the events that led to
News Security vendor's CEO denies challenges around acquisitions were factor in NETconsent's retreat.
By Jane McCallion Published
News -
Cambridge University boffins to combat rise of the machines
News Scientists to look at ways to see off Terminator-style threat
By Rene Millman Published
News -
Data security: is breach mitigation all that's left?
In-depth If you accept the premise that it's inevitable your enterprise network will be attacked, and most likely breached, then is mitigation really where the IT security focus should be? Davey Winder investigates...
By Davey Winder Published
In-depth