Please turn on your JavaScript for this page to function normally.
Cross Match acquires DigitalPersona

Cross Match Holdings and DigitalPersona announced a merger agreement that will combine the two companies. With more than 300 employees, a network of partners and millions of …

Organizations remain vulnerable to SQL injection attacks

Privacy and information security research firm Ponemon Institute, along with DB Networks, an innovator of behavioral analysis in database security, today announced the results …

Understanding risk is a top security concern

The biggest challenge for organizations is prioritizing, understanding and addressing vulnerabilities in a business context, according to an AlgoSec survey conducted during …

Compliance is no guarantee of security

The regulatory landscape is constantly evolving. For example tougher new EU data protection laws are scheduled to come into effect over the next year or two. These new …

Security pros largely unhappy with compliance methods

Despite the fact that 63% consider regulatory compliance to be “very important”, a new Osterman study shows a low satisfaction level with current methods of …

ESET launches secure authentication SDK

ESET launched the ESET Secure Authentication Software Development Kit (SDK). With this release, ESET provides system architects with a comprehensive developer guide in three …

Attackers use reflection techniques for larger DDoS attacks

Akamai announced a new global DDoS attack report, which shows that in Q1, DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification …

Dangerous spam targets Brits with fake Easter offers

Cybercriminals are hiding dangerous goodies among the Easter eggs and chocolate bunnies that Brits are hoping for this Easter. A large amount of religious scams have also been …

Security pros and government failing to collaborate

Infosecurity Europe has today released a new report that provides a snapshot of the industry landscape and the challenges it is currently facing. Having surveyed 1,149 …

SharePoint users are breaching security policies

A study, conducted amongst attendees at last month’s Microsoft’s SharePoint Conference in Las Vegas, has found that at least 36% of SharePoint users are breaching …

Microsoft releases Threat Modeling Tool 2014

The Microsoft Threat Modeling Tool 2014 is the latest version of the free Security Development Lifecycle Threat Modeling Tool that was previously released back in 2011. …

Security pros actively hiding negative facts from executives

A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff. In nearly 60 percent of the …

Don't miss

Cybersecurity news