Tag: How
-
How to Balance Speed and Security in Your Application Security Program
In today’s ever-evolving digital trust landscape, the term DevOps has become synonymous with speed. If you want to compete, you need to …
-
How Likely Is Your Organization to Be Breached?
Trend Micro and the Ponemon Institute teamed up to produce a new Cyber Risk Index (CRI), which will be updated every six months. Today I …
-
How Android Fought the Chamois Botnet—and Won
the Android security team was feeling pleased with itself. The group had detected, analyzed, and neutralized a sophisticated botnet built …
-
How to quickly deploy, run Linux applications as unikernels
Building and deploying lightweight apps is becoming an easier and more reliable process with the emergence of unikernels. While limited in …
-
How the ‘New York Times’ Protects its Journalists From Hackers and Spies
Hackers have been targeting journalists, and their organizations, for years. Advertisement In 2012, The New York Times revealed that …
-
How CISOs should respond to the cybersecurity crisis
Graham Cluley Security News is sponsored this week by the folks at CloudShare. Thanks to the great team there for their …
-
EHR Means “Electronic Health Records” Right? Nope – How About “Errors Happen Regularly”
Bring medicine into the digital age. EHR’s promised better care, patient empowerment and lower …
-
How to Fight the Threat of USB Thumb Drives
It doesn’t really matter whether Yujing Zhang is a spy for the Chinese government, an enthusiastic sleuth or simply a misguided young …
-
Office 365 phishing attacks: How hackers get access to your business
With 155 million corporate users, the highly popular Microsoft Office 365 has become a target-rich environment for sophisticated phishing …
●●●