Please turn on your JavaScript for this page to function normally.
Database security is too complex to implement

A recent GreenSQL survey of IT professionals worldwide concluded that 31.4% of security professionals believe that database security implementation is too complex, making it …

Hacker to business owner: Spotting innate talent in others

There has been much debate recently in the UK about the current GCSE exam format. On the one side are those that argue it should be scrapped in favour of a complex testing …

Governance and assurance guidance for big data

Big data can save big money. A recent McKinsey report found that value gained from data in the US health care sector alone could be more than US $300 billion every year. But …

Fight cybercrime with a visit to Infosecurity Europe 2013

Over the last year we have witnessed security attacks against the worlds’ largest organisations, and cyber-attacks which have increasingly been viewed as one of the …

Mandiant threat report on advanced targeted attacks

Mandiant released its fourth annual M-Trends report, which details the tactics used by threat actors to compromise organizations and steal data. It also highlights incident …

CSOs must adopt new risk management trends

Wisegate released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach. Security …

(IN)SECURE Magazine issue 37 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 37 has been released today. Table of contents: …

Metasploit supports Kali Linux free security auditing toolkit

Rapid7 is working with Offensive Security to provide official Metasploit support for Kali Linux, the enterprise-ready evolution of BackTrack Linux. The free security auditing …

Tips for removing data from mobile devices

AVG released tips on how consumers can remove their personal data before they recycle or throw away their old smartphones. In an era of frequent and seamless device upgrades, …

Microsoft releases four critical bulletins

In terms of volume, the March Patch Tuesday is about average, with seven bulletins — four rated “critical” and three rated “important.” In …

Trend Micro introduces new end user protection suite

Trend Micro announced a new suite – Trend Micro Enterprise Security and Data Protection – designed to help companies efficiently mitigate the risks of attacks and …

First direct silicon-to-photonics-based router family

Compass-EOS announced r10004, the first in a family of next-generation, core-grade modular routers. The r10004 is three times smaller than comparable core routers and supports …

Don't miss

Cybersecurity news