Mobile Threat Report

July 3, 2014

Mobile security issues are present on all major mobile platforms, though threats affect each platform differently. In this report, we specifically focus on iOS and Android. Source


Largest Data Breaches Of All Time

June 29, 2014

As Sony deals with their most recent data breach of one million passwords, we look at the the largest data loss incidents on record, according to DataLossDB. Source


A Lookout Look Back

June 11, 2014

Lookout may be charging ahead with their recent launches of their APP in the UK, Australia and Canada, but they haven’t forgotten their roots. For key dates and important events in Lookout’s history, check out the timeline below. Source


Adobe Becomes “The Man”?

May 31, 2014

In 2010 the security software company McAfee predicted that Adobe would be a bigger target for hackers than Microsoft. This prediction came true. So why do hackers target Adobe? This infographic looks at Adobe and how they can get off the hackers’ target list. Source


IT Security Threats Q1 2010

May 29, 2014



Wireless Security Creates a Smarter, Safer Home

May 27, 2014

With advancements in smart home technology, there are constantly new features released to automate just about any facet of your home and it can be controlled straight from a keypad. When stripped away from all of these features though, these systems are truly lifestyle management tools. From our findings, of all the various types of […]


Facebook and Websense Partner to Protect Users from Malicious Links

May 9, 2014

At Websense, we are all about innovation and changing the security game. We were the first company to promote and enable our customers to embrace safe, productive use of social with our web security gateway, the first to deliver security and anti-spam to protect companies presence within Facebook with Defensio, and now we are assisting […]


The Case of the Search Engine Poisoning

May 2, 2014

Imperva released a report on search engine poisoning. Search Engine Poisoning attacks manipulate, or “poison”, search engines to display search results that contain references to malware-delivering websites. There are a multitude of methods to perform SEP: taking control of popular websites; using the search engines’ “sponsored” links to reference malicious sites; and injecting HTML code. […]


Survival Guide to Securing the Social Enterprise

April 29, 2014

Securing the Social Enterprise: A Survival Guide presents the core steps for IT managers to reduce risks, prevent data leaks and avoid sharing information with the wrong connections, all while still enabling secure and efficient enterprise collaboration. Source

Microsoft’s Cloud Privacy Infographic

April 15, 2014

The Privacy team at Microsoft has created a new infographic on cloud computing privacy. The infographic outlines concerns with privacy in the cloud, then spells out Microsoft’s approach to addressing them – Transparency, Control, and Responsibility. Source


Microsoft Kicks off Public Safety Symposium with Focus on the Cloud

March 31, 2014

Now more than ever, technology helps governments and non-government organizations address some of the most pressing public safety challenges, from responding to disasters and managing significant events to protecting critical information and national security needs. Source


The Not-So-Smart Phones of 2011

March 29, 2014

Almost every Android phone purchased – no matter how new or old – on the market today does not have the most recent version: 2.3.7. Some are a full year behind the update schedule dictated by Google, which means security vulnerabilities are not being maintained, bugs are not being patched, and loopholes in your system […]