Please turn on your JavaScript for this page to function normally.
Week in review: Reactions to PRISM, and the question of whether or not to hack back

Here’s an overview of some of last week’s most interesting news, articles and reviews: The future of online authentication Recently, Twitter has introduced …

Automated analysis of essential security controls

EiQ Networks announced ThreatVue, an out-of-the-box security monitoring solution that automates the implementation, analysis and remediation guidance of essential security …

In-house control and encrypted voice calls

Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …

Large orgs in denial about own security breaches?

Over two thirds (66%) of large organizations said they either had not experienced a security incident in the last 12-18 months or were unsure if they had, a recent Lancope …

Americans were anxious about privacy even before NSA spying scandal

Big Brother is watching and Americans know it. New figures from the quarterly Allstate/National Journal Heartland Monitor Poll show that most Americans exhibit a healthy …

Eight charged for hacking global financial institutions

Eight alleged members of an international cybercrime, money laundering and identity theft conspiracy have been federally charged in New Jersey with a scheme to use information …

Oppose PRISM-like programs today or lose you privacy tomorrow

I used to work for a telecommunication company. The government had access to call records, although the process for obtaining any information required manual requests and …

OWASP top 10 web application risks for 2013

Since 2003, application security researchers and experts from all over the world at the Open Web Application Security Project (OWASP) have carefully monitored the state of web …

Automated password management for privileged accounts

BeyondTrust announced the release of PowerBroker Password Safe, including integration with Retina CS, the company’s vulnerability management platform. PowerBroker …

How orgs should handle personal data on IT systems that they don’t control

Organizations should create a privacy program that keeps personal data at arm’s length, but under control, according to Gartner, which predicts that by 2019, 90 percent …

Ping Identity updates cloud identity management platform

Ping Identity announced PingFederate 7, an upgrade to its identity bridge software and Cloud Identity Management Platform. The release delivers standards-based user …

Log analysis and alert management platform

RandomStorm has released its new integrated log analysis, HIDS and file integrity platform, StormAgent. StormAgent automates protective monitoring of network hosts, reducing …

Don't miss

Cybersecurity news