Please turn on your JavaScript for this page to function normally.
Natural Security Alliance releases specs for strong authentication standard

The Natural Security Alliance has released the newest specifications for its world first strong authentication standard. The standard defines a strong authentication method, …

Network, engage and do business at Infosecurity Europe

Infosecurity Europe is the largest and most attended information security event in Europe. Held in central London, it is a free event featuring over 325 exhibitors presenting …

SCADA risk awareness, threats and breaches

SANS announced results of its 2014 Survey on control system security, in which 268 IT professionals answered questions about their overall risk awareness, trends in threats …

Black markets for hackers are maturing

Black and gray markets for computer hacking tools, services and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, …

Five tips to reduce identity theft

Some Americans submitting their taxes this year will make the unpleasant discovery that someone else has already filed and stolen their refunds. Tax fraud claimed 1.2 million …

Sogeti social engineering challenge at HITB Haxpo

For the third year in a row Sogeti organizes the social engineering challenge during Hack In The Box Amsterdam. In 2012 and 2013 they asked contestants to show weaknesses in …

Product pitch: ForgeRock Identity Relationship Management

In this product pitch recorded at RSA Conference 2014, Daniel Raskin, VP of Marketing at ForgeRock, talks about Identity Relationship Management. As more people, devices and …

Palo Alto Networks to acquire Cyvera

Palo Alto Networks announced a definitive agreement to acquire Cyvera, a privately held cybersecurity company located in Tel-Aviv, Israel. Under the terms of the agreement, …

New non-profit against cyber crime launches

Experts and companies in the information security industry formed the Secure Domain Foundation (SDF), a non-profit, community-driven organization devoted to the identification …

February spam highlights

Kaspersky Lab found that many malicious attachments in February’s spam came in emails allegedly sent by women who wanted to make new friends in the run-up to …

Week in review: NSA records a country’s phone calls, SSL innovations, and (IN)SECURE Magazine special issue

Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos, interviews, and articles: US announces transition of oversight over …

IBM launches new software and consulting services

IBM introduced new software and services to help organizations use Big Data and Analytics to address the $3.5 trillion lost each year to fraud and financial crimes. Through …

Don't miss

Cybersecurity news