Please turn on your JavaScript for this page to function normally.
ManageEngine enhances Firewall Analyzer and EventLog Analyzer

ManageEngine announced enhancements to its firewall security and configuration management software, Firewall Analyzer, and to EventLog Analyzer, its log management and IT …

Barracuda launches Barracuda Firewall X100 and X101

Barracuda Networks announced the new Barracuda Firewall X100 and X101, next-generation firewalls designed for small businesses. Barracuda also released new firmware, version …

FireEye introduces real time, continuous protection platform

FireEye announced Oculus, a global, real time, continuous protection platform. Oculus is comprised of three components: Threat prevention platform – The FireEye Threat …

Head of INTERPOL on the key to protecting cyberspace

With the physical and virtual worlds becoming increasingly interconnected, INTERPOL Secretary General Ronald K. Noble told the Underground Economy 2013 conference at the world …

Email data protection through a mobile app

ZixCorp announced commercial availability of ZixOne, a mobile email app that solves the key IT challenge created by the BYOD trend. ZixOne manages access to corporate email …

Neohapsis and Arxan protect sensitive apps

Neohapsis and Arxan announced a partnership to offer enhanced tamper-resistance and self-defense built into a comprehensive application security strategy. According to recent …

Online backup for mobile devices: Key factors to consider

Most technology users keep personal information (contacts, calendars, documents, photos, etc.) on their mobile devices. That information isn’t protected if the mobile is …

Arbor Networks acquires Packetloop

Arbor Networks has acquired privately held Packetloop, an innovator and provider of Security Analytics. Terms of the deal were not disclosed. Arbor plans to invest in and …

Training: The Art of Exploiting Injection Flaws

HITBSecConf 2013 Malaysia will host the widely acclaimed course The Art of exploiting Injection Flaws in Kuala Lumpur on 14 and 15 October 2013. This hands-on session will …

Login and password troubles revealed

Increasingly lengthy and complex log-in processes and web forms are driving consumers away from websites, according to Ping Identity. The study revealed that an overwhelming …

Leaked FinFisher presentation details toolkit’s spying capabilities

F-Secure’s Mikko Hypponen has shared several interesting slides from a presentation that displays the wide range of capabilities offered by the FinFisher commercial …

Most security managers don’t trust their apps

Application vulnerabilities are a major factor in the cybercrime game. More than 500 CISOs and Security managers have been interviewed by Quotium about the security state of …

Don't miss

Cybersecurity news