Please turn on your JavaScript for this page to function normally.
Are workers drowning in a sea of ineffective technology?

With the rise of mobile, the cloud and multiple device use, today’s workers are more connected than ever before, giving them access to high-volume streams of information …

Bruce Schneier: The battle for power on the Internet

Bruce Schneier gives us a glimpse of the future of the internet, and shares some of the context we should keep in mind, and the insights we need to understand, as we prepare for it.

Technology eliminates bot-infected traffic from advertising campaigns

White Ops introduced a systematic solution for eliminating bot-infected traffic from advertising campaigns. “We have spent over a year tracking the bad guys attacking …

Aruba Networks releases cloud Wi-Fi solution

Aruba Networks announced a new cloud-managed Wi-Fi solution that combines the simplicity of a cloud service with the performance, manageability and reliability of …

McAfee solution remediates advanced malware

McAfee announced an end-to-end solution to help organizations combat the increasing challenges of advanced malware. McAfee goes beyond single-feature, static analysis …

Is wireless the Trojan horse in your network security?

According to Roger Klorese of WatchGuard technologies, smartphones and tablets now account for about 25% of devices used for work in the US. Wireless, mobility and BYOD are …

Could the EU cyber security directive cost companies billions?

Many of the world’s largest enterprises are not prepared for the new European Union Directive on cyber security, which states that organizations that do not have …

Connections between personality types and phishing

Phishing scams are some of the most effective online swindles, hooking both savvy and naive computer users. New insights from researchers at the Polytechnic Institute of New …

Video: Cracking corporate passwords

Cracking corporate passwords is different than cracking public MD5 leaks off of pastebin. Corporate passwords are not in the same formats you are used to, they require capital …

Splunk Enterprise 6 released

Splunk announced Splunk Enterprise 6, which delivers analytics, up to 1,000 times faster than previous versions, and patent-pending technology designed to unlock the value of …

Portable USB drive fixes malware-crippled machines

Malwarebytes launched Techbench, a tool to help IT workers fix and restore even the most malware-infected computers. The 16GB USB simply needs to be plugged into the infected …

Get a VIP ticket to HITBSecConf and $1337 of travel money

Following the success of the first #HITB1337Giveaway held in conjunction with HITBSecConf2013 – Amsterdam, Hack In The Box is now bringing this popular Twitter-based …

Don't miss

Cybersecurity news