Please turn on your JavaScript for this page to function normally.
Unlocking MS Office 2007/2010 documents

Cloud-based password unlocking service Password-Find introduced a new decrypting algorithm that unlocks half of Microsoft Office 2007/2010 Word, Excel, and PowerPoint …

Encrypted e-mail service from Silent Circle

Silent Circle announced the availability of the company’s new Silent Mail e-mail encryption service. Silent Mail addresses longstanding problems with e-mail encryption: …

Free endpoint backup for small teams

Druva introduced free IT-managed endpoint backup for groups of up to 15 users with a new edition of Druva inSync, its integrated suite of backup, file sharing, data loss …

How financial institutions can overcome the cloud security barrier

In financial services, with the hundreds of complex regulations that apply to data, private cloud adoption is still more common than the public cloud to date. However, that is …

IT decision makers mark increase in security-related incidents

More than one-third of surveyed European enterprises (36%) have experienced an increase in the frequency of network and data security-related incidents in the last 18 months, …

Most corporate computers missing critical software updates

87 percent of corporate computers are missing critical software updates that could threaten business security, according to F-Secure data from around 200,000 workstations …

AlienVault releases USM virtual appliance

AlienVault released its AlienVault Unified Security Management (USM) virtual appliance, a collection of open source tools for asset discovery, vulnerability assessment, threat …

Average DDoS attack bandwidth up 718 percent

The average DDoS attack bandwidth in Q1 2013 totaled 48.25 Gbps, which is a 718 percent increase over last quarter, and the average packet-per-second rate reached 32.4 …

Oracle plugs a host of critical Java vulnerabilities

Oracle’s Java SE Critical Patch Update for April 2013 contains 19 CVEs with CVSS base score of 10 (the highest you can go) indicating that exploiting the vulnerability …

A guide to negotiating and assuring cloud services

How can an organization safely adopt cloud services to gain the benefits they provide? The easy availability of cloud services has sometimes led to line of business managers …

Insider threats and BYOD still a great problem

Insider threats are the greatest concern and that permitting employees to connect their own devices to the network increases the risk of security breaches, according to …

Big data drives big demand for storage

As demand for Big Data technology and services continues to escalate, all levels of the Big Data technology stack will experience significant growth. Storage is a critical …

Don't miss

Cybersecurity news