Please turn on your JavaScript for this page to function normally.
Cybercriminals exploit most news within 22 hours

Cybercriminals continue to respond with lightning speed when they see an opportunity to exploit a national or global news story to spread malware. In fact criminals are …

Watchful Software updates its information protection solution

Watchful Software released RightsWATCH 5.0, which extends the secure flow of information throughout an organization while automatically applying corporate security policies …

Industry leaders perceive numerous security threats to their data

An overwhelming majority of business leaders believe their customers and clients worry about breaches of personal data held by their organizations. Unisys-sponsored research …

Organizations fear their privacy activities are insufficient

The perceived level of maturity attached to organizations’ privacy activities has decreased since 2011, as many organizations deem their existing privacy activities to …

Organizations are flying blind as they embrace cloud services

Organizations lack the information to understand and mitigate a broader set of risks posed by the use of cloud services, according to Skyhigh Networks. “What we are …

Icefog cyber espionage campaign exposed

Kaspersky Lab’s security research team discovered Icefog, a small yet energetic Advanced Persistent Threat (APT) group that focuses on targets in South Korea and Japan, …

Big data analytics for security intelligence

The Cloud Security Alliance (CSA) Big Data Working Group today announced the release of Big Data Analytics for Security Intelligence. The new research report details how the …

Amazon.com released Fire OS 3.0 “Mojito”

Amazon.com introduced Fire OS 3.0 “Mojito,” the next generation of software and services that powers Kindle Fire tablets, with hundreds of updates and new features …

Deploy endpoint encryption technologies with Wave Cloud 2014

Wave Systems launched Wave Cloud 2014, a cloud-based service for enterprise-wide management of endpoint encryption. It includes management of Windows BitLocker and Mac …

CORE Impact Pro 2013 R2 gets enhanced web services capabilities

CORE Security released CORE Impact Pro 2013 R2, that allows organizations to proactively test IT infrastructure and identify exactly where and how an organization’s …

Employees keep using personal cloud services to store work documents

Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows in which 5% of …

Java exploits jump, Android malware emerges outside app stores

A continued rise in exploit-based attacks, particularly against Java, and an increasing sophistication in mobile threats characterized the first half of 2013, which saw its …

Don't miss

Cybersecurity news