Remove 2014 Remove Malware Remove Programming Remove Security
article thumbnail

Enterprise IT in 2014 – Under-the-Radar Challenges with WAN Bandwidth, BYOD, and XP Security

CTOvision

In a 2014 Next-Generation WAN Survey , 68 percent of respondents said demand for WAN bandwidth will increase over the next year. Securing these devices is nearly impossible because they are not corporate controlled. XP Will Cause Significant Security Issues. Limited WAN Bandwidth. This adds to IT’s burden instead of reducing it.

WAN 273
article thumbnail

Tech Trends in 2014: Actionable Insights For Your Career

CTOvision

Lenzner is a thought-leader in the enterprise security, technology risk, privacy, and compliance arenas. Q: In your opinion what are the Top 5 anticipated tech trends for 2014? A: Cyber-security is now a global concern and key risk factor across most industries and organizations. As data breaches brought the U.S.

Trends 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Security attacks and countermeasures

Cloud Musings

Johnson Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell’s Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. For example, in the first half of 2014, 84.6%

Security 159
article thumbnail

Security and Windows 10 Will Cross Paths for Enterprises

CTOvision

Last year, Enterprise IT was dramatically shaped by the influx of security breaches, data leaks and a new wave of hackers. This year, two of 2014’s biggest stories will intersect as security and Windows 10 prepare to re-shape the Enterprise. Security Spending. Windows 10.

Windows 150
article thumbnail

A series of patent lawsuits is challenging the history of malware detection

The Verge

Filed March 4th in the famously patentholder-friendly Western District of Texas court, the four lawsuits claim that techniques fundamental to modern malware detection are based on patented technology — and that the company’s competitors are infringing on intellectual property rights with their implementation of network security software.

Malware 60
article thumbnail

Shared malware code links SWIFT-related breaches at banks and North Korean hackers

Network World

Malware links suggest that North Korean hackers might be behind recent attacks against several Asian banks, including the theft of US$81 million from the Bangladesh central bank earlier this year. The same malware was also previously linked to an attempted theft of $1 million from Tien Phong Bank in Vietnam.

Malware 63
article thumbnail

Protecting Against the Increasing Malvertising Threat

CTOvision

This article increases awareness for organizations and individuals seeking to enhance their digital security posture against malvertising (“malicious advertising”). Notable Examples: In December 2016, ESET researchers identified the ‘ Stegano ’ campaign (which dates back to 2014). Crystal Lister. Key trends: .