Please turn on your JavaScript for this page to function normally.
Qualys announces WAF Beta for Amazon EC2

Qualys will release the beta of its new cloud WAF solution as an Amazon Machine Image (AMI) and as a VMware virtual image for on-premise deployments starting August 1. …

Umbrella by OpenDNS Service blocks advanced cyber attacks

The new release of the OpenDNS Umbrella Web security platform has been enhanced with predictive detection capabilities provided by the Umbrella Security Graph. It can …

AWS cloud management APIs: Don’t overlook a key security component

Xceedium has enhanced Xsuite to include protection for the Amazon Web Services management APIs that advanced cloud customers use to monitor and configure their AWS …

DDoS attack size growing dramatically

Arbor Networks released data on DDoS attack trends for the first half of 2013. The data shows that DDoS continues to be a global threat, with a clear increase in attack size, …

Study on private vs public sector software glitches

In the private sector, software errors are causing both financial and reputational damage. A new study identified private sector businesses in the banking, retail and mobile …

Security complexity and internal breaches are key concerns

Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses. 64% of respondents to a Check …

FTC crackdown on “free gift card” scammers

The FTC has moved to shut down an international network of scammers that sent millions of unwanted text messages to consumers, using the lure of “free” gift cards …

Sharp increase in blended, automated attacks

FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to …

Norman Shark updates Malware Analyzer G2

Norman Shark announced Malware Analyzer G2 (MAG2) 4.0, which provides hybrid analysis, and Network Threat Discovery (NTD) 5.1, a cyberattack discovery system that …

nPulse updates its flow and packet capture appliance

nPulse released a new version of its Capture Probe eXtreme (CPX) flow and packet capture appliance, which provides a packet indexing solution at 30 million packets per second. …

To achieve good security, you need to focus on business

In September 2001, as the Nimda computer worm devastated networks worldwide, we in IT security thought that the management will finally wake up and see how important it was to …

The scary implications of Google Glass

Google Glass, for all its promise, has some scary implications. Here is my list of potential challenges we face with Glass: User experience Social awkwardness Privacy (or lack …

Don't miss

Cybersecurity news