Please turn on your JavaScript for this page to function normally.
Video: Operationalizing security intelligence in the enterprise

Many organizations say they acquire and use security intelligence for the benefit of their organizations – but few actually do this right. While security intelligence is …

Week in review: Vessel tracking system cracked, iCloud protocols analyzed, the relevancy of AV tests

Here’s an overview of some of last week’s most interesting news, videos, inteviews and articles: Digital ship pirates: Researchers crack vessel tracking system In …

Big thinkers converge on small town for Day-Con 2013

Day-Con, Dayton Ohio’s annual hacker conference, celebrated its 7th year last month with a completely re-imagined format: limited seating, invitation only, and …

Ubuntu 13.10 released, improves on cloud setup and management

Canonical released the next version of Ubuntu for server and cloud environments. Ubuntu 13.10 delivers the latest and best version of OpenStack, and is the fastest, most …

Webroot enhances mobile threat protection

Webroot released a new edition of Webroot SecureAnywhere Business – Mobile Protection to ensure mobile devices and company data stay secure. As more organizations face …

avast! 2014 released

AVAST Software launched avast! 2014 – the latest version of the antivirus solution used by a quarter of all protected PCs worldwide. The new version improves …

Video: Malware Management Framework

You can throw lots of time and money at scanning your systems for unknown malware, but the reality is that you will only identify a small portion of the bad stuff. Changing …

Plan to fail for better security

We’ve all heard the old saying: “If you fail to plan, you’re planning to fail.” Of course, it’s true: and from a security viewpoint, it’s …

How CISOs get executive buy-in for security budgets

Wisegate released a new report that shares how CISOs successfully gain executive buy-in on security budgets and strategically manage them. Most CISOs face significant …

The Internet of Things: Vulns, botnets and detection

Does the Internet of Things scare you? It probably should. This DerbyCon video discusses why embedded device security is laughably bad, handling vendor notification, and …

DDoS attack size accelerating rapidly

Arbor Networks released data on global DDoS attack trends for the first three quarters of 2013. The data shows that DDoS continues to be a global threat, with alarming …

Free Android security app from Malwarebytes

Malwarebytes launched a free mobile security application for Android devices. Malwarebytes Anti-Malware Mobile, available on

Don't miss

Cybersecurity news