Tag Archive for: Short

The Big Read in Short: Singapore’s weakest link in cyber security – TODAYonline

The Big Read in Short: Singapore’s weakest link in cyber security  TODAYonline

Each week, TODAY’s long-running Big Read series delves into trends and issues that matter. This week, we look at how complacency among employees could …

“computer security news” – read more

Take this short survey to assess your organization’s threat intelligence maturity

Recorded Future. Take this short survey to assess your organization's threat intelligence maturity.

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!

Recorded Future believes that every security team can benefit from threat intelligence. That’s why it has launched its new Threat Intelligence Grader — so you can quickly assess your organization’s threat intelligence maturity and get best practices for improving it.

Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. It empowers organizations to reveal unknown threats before they impact business, and enables teams to respond to alerts 10 times faster.

To supercharge the efforts of security teams, Recorded Future’s technology automatically collects and analyzes intelligence from technical, open web, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies.

91 percent of the Fortune 100 use Recorded Future.

Try out Recorded Future’s Threat Intelligence Grader for yourself now!


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Graham Cluley

Once prominent infection method now declining – short blip or for good? – SecurityBrief Africa


SecurityBrief Africa

Once prominent infection method now declining – short blip or for good?
SecurityBrief Africa
Exploit kit activity is waning. Collectively these malware distribution tools used to be a prominent method of infection. They rely on compromised websites, malicious adverts and social engineering to direct web traffic to their landing pages and

and more »

exploit kit – read more

AT&T response to critics of iPad-toting techs comes up short

A post here Wednesday headlined “Networking pros slam AT&T for arming techs with iPads instead of laptops” was lacking a response from AT&T until one arrived yesterday afternoon. And while that reply was added to the post yesterday, I believe it’s worth repeating here for those who may have missed it.

“In 2010, we began transitioning our field technicians to handheld devices, such as smartphones and tablets. This made our techs more agile and moved their capabilities forward by enabling a suite of applications they could use on-site to increase efficiency and improve the customer experience. While a majority of our techs only use handheld devices, others who handle special services use a range of tools including laptops. In situations where a handheld device is not sufficient, we ensure our techs are able to get the tools and equipment needed.”

To read this article in full or to leave a comment, please click here

Network World Paul McNamara