Please turn on your JavaScript for this page to function normally.
What threats will dominate 2014?

Trend Micro released its annual security predictions report. The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and …

The DDoS debate: Multi-layered versus single solution

There is a DDoS debate in the cybersecurity industry about which solution is more effective – multi-layer or single. However, the argument is really more complex and …

Tech giants call for government surveillance reform

Eight Internet giants have formally urged the US president and Congress to reform and limit government surveillance, and have offered several suggestions on how to do it. AOL, …

1Password 4.1 for Mac adds new password updating, better search

Popular password manager 1Password for Mac reached version 4.1 that comes with some long-requested features, the most notable being a new Login (password) updating process. If …

Cybercrime ignorance is a serious risk

Organizations who fail to recognize the threat posed by cyber crime are putting the livelihoods of stakeholders and customers at serious risk, and those organizations that …

13 Anonymous hackers plead guilty to PayPal DDoS attack

Thirteen defendants pleaded guilty in federal court in San Jose on Friday to charges related to their involvement in the cyber-attack of PayPal’s website as part of the …

Cloud security in 2014: Automation and consolidation

Eric Chiu, president and co-founder of HyTrust, predicts that in 2014: 1. Organizations will discover the importance of BYOS for public cloud. Given the recent disclosures …

ENISA issues recommendations on SCADA patching

“How long can we afford having critical infrastructures that use unpatched SCADA systems?” the EU’s cyber security Agency ENISA asks, and advises EU Member …

Week in review: Air gap-hopping malware, first PoS botnet, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news and articles: (IN)SECURE Magazine issue 40 released (IN)SECURE Magazine is a free digital security …

Data-slurping Android flashlight app developer settles with FTC

The creator of one of the most popular apps for Android mobile devices has agreed to settle Federal Trade Commission charges that the free app, which allows a device to be …

What CIOs can expect in 2014

While the 3rd platform of mobile, social, big data, and cloud services is just beginning to mature, it will require an entirely different set of IT skills and roles — many of …

CSA details Software Defined Perimeter Framework

The Cloud Security Alliance (CSA) announced the release of the Software Defined Perimeter Report, a new white paper report that explains the Software Defined Perimeter (SDP) …

Don't miss

Cybersecurity news