Please turn on your JavaScript for this page to function normally.
MS SQL Agent facilitates the collection of MSSQL audit records

SNARE for MSSQL allows a security administrator to remotely set up, control and monitor the application through a standard web browser and a self-contained installation …

Intigua: Automate the provisioning of management technologies

CIOs today are asking their IT teams to build private clouds that reflect the on-demand simplicity and agility that Amazon Web Services delivers in its public cloud. Unlike …

Microsoft releases critical fixes for IE and Exchange Server

There’s a remotely exploitable, publicly disclosed, critical remote code execution vulnerability in Microsoft Exchange (MS13-061)! But wait, is it really remotely …

Hacking a smart lightbulb system

The phenomenon of the Internet of Things (IoT) is positively influencing our lives by augmenting our spaces with intelligent and connected devices. Examples of these devices …

Most government CIO budgets flat or increasing in 2013

Despite a continuing drive to lower the cost of IT services, nearly 75 percent of government IT budgets globally were reported as flat or increasing in 2013, according to the …

How much confidential info is left unprotected in SharePoint?

A Cryptzone security survey undertaken amongst SharePoint practitioners at the Microsoft conference in Las Vegas, reveals how many organizations have inadequate security and …

Protect against threats targeting Android

Palo Alto Networks’ WildFire malware analysis sandbox now is capable of analyzing Android applications in the APK file format to identify advanced threats in Android …

Fortinet expands secure application delivery product portfolio

Fortinet announced new additions to its secure application delivery product portfolio that are a result of the company’s acquisitions of Coyote Point Systems and XDN. …

Can biometrics revolutionize mobile payment security?

With the explosion in smartphones usage, the number of payments done via mobile devices has significantly increased over recent years. As eCommerce becomes mCommerce, the …

Adoption of antivirus software on mobile devices remains low

Consumer adoption and willingness to pay for antivirus software on mobile devices is low, according to Gartner. Gartner believes that high consumer use of personal mobile …

Week in review: Tor users targeted with spyware, secure mail providers close up shop

Here’s an overview of some of last week’s most interesting news, reviews and articles: Working as an ethical hacker The majority of people in the security industry …

Netwrix updates its configuration auditing software

Netwrix Corporation announced Netwrix Auditor 5.0, a configuration auditing solution for security, compliance and operations across the entire IT infrastructure. It provides …

Don't miss

Cybersecurity news