Please turn on your JavaScript for this page to function normally.
Is it time to professionalize information security?

The issue of whether or not information security professionals should be licensed to practice has already been the topic of many a passionate debate. I think it is time to …

A spotlight on grid insecurity

Drawing from responses from more than 100 utilities across America, a new report shows that the nation’s electric grid remains highly vulnerable to attacks from Iran and …

NYPD detective accused of hiring email hackers

Edwin Vargas, a detective with the New York City Police Department, has been arrested on Tuesday for computer hacking crimes. According to the complaint unsealed in Manhattan …

Experts highlight top data breach vulnerabilities

Hidden vulnerabilities lie in everyday activities that can expose personal information and lead to data breach, including buying gas with a credit card or wearing a pacemaker. …

Why BYOx is the next big concern of CISOs

Wisegate released new research from its members that demonstrate how CIOs and CISOs are working to achieve the right balance between employee productivity and information …

Free tool repairs critical Windows configuration vulnerabilities

Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and …

IT pros focus on cloud security, not hype

Cloud computing is exceeding expectations, according to a CA report. Respondents indicate the cloud has moved beyond adolescence and is on the path to maturity in the …

Blue Coat to acquire Solera Networks

Blue Coat Systems has entered into an agreement to acquire Solera Networks, a provider of big data security intelligence and analytics for threat protection. The Solera …

CISOs need to engage with the board

Cyberspace has placed information risk firmly on the boardroom agenda, and CISOs need to engage with their boards to ensure their organizations understand and manage …

Find TrueCrypt and BitLocker encrypted containers and images

Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan. For a computer …

Wi-Fi client security weaknesses still prevalent

Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …

Sourcefire goes beyond the sandbox

Sourcefire introduced malware trajectory capabilities across its Advanced Malware Protection portfolio, giving customers visibility into malware attack activity and enabling …

Don't miss

Cybersecurity news