Please turn on your JavaScript for this page to function normally.
Palo Alto Networks to acquire Cyvera

Palo Alto Networks announced a definitive agreement to acquire Cyvera, a privately held cybersecurity company located in Tel-Aviv, Israel. Under the terms of the agreement, …

New non-profit against cyber crime launches

Experts and companies in the information security industry formed the Secure Domain Foundation (SDF), a non-profit, community-driven organization devoted to the identification …

February spam highlights

Kaspersky Lab found that many malicious attachments in February’s spam came in emails allegedly sent by women who wanted to make new friends in the run-up to …

Week in review: NSA records a country’s phone calls, SSL innovations, and (IN)SECURE Magazine special issue

Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos, interviews, and articles: US announces transition of oversight over …

IBM launches new software and consulting services

IBM introduced new software and services to help organizations use Big Data and Analytics to address the $3.5 trillion lost each year to fraud and financial crimes. Through …

Webcast: Beware of the Wild Wild Web

The World Wide Web is wasteland brimming with uncontrolled threats and dangers to IT security. Network and IT managers can prevent those threats from causing damage by …

Risks and opportunities of personal data, privacy, and trust

The increased number of stories on data breaches in the news today has many implications, for consumers it’s an increased risk of financial loss, identity theft and …

Product pitch: DigiCert Certificate Inspector

SSL Certificates serve as the security backbone of the internet, securing billions of interactions annually. Yet, too often, system administrators fail to properly configure …

Operation dismantles child exploitation enterprise on Tor network

DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …

Full Disclosure mailing list closure elicits mixed reactions

The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its …

Edward Snowden: Here’s how we take back the Internet

Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but …

The Internet of Things will transform the data center

The Internet of Things (IoT) has a potential transformational effect on the data center market, its customers, technology providers, technologies, and sales and marketing …

Don't miss

Cybersecurity news