Please turn on your JavaScript for this page to function normally.
Real world social engineering challenge at HITBSECCONF2013

Global IT services provider Sogeti will launch their social engineering challenge during the Hack In The Box Amsterdam conference in April. The challenge will be to social …

Hidden security threats on enterprise networks

Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …

Silent Text iOS app can auto-delete sent messages

Silent Circle announced features in the company’s updated Silent Text secure messaging app for iOS. Customers can now: Send private encrypted messages and use Silent …

IBM shows where vulnerabilities appear in iOS apps

IBM announced security software that helps organizations proactively reduce the security risk to iOS enterprise apps. Clients will be able to build security testing into the …

ESET releases two-factor authentication software solution

ESET announced the availability of ESET Secure Authentication, a two-factor authentication (2FA) software solution for SMBs that makes use of remote end-users’ mobile …

IS Decisions releases FileAudit 4

IS Decisions released FileAudit 4, its file audit, archiving and reporting tool. It is the only file auditing solution Microsoft-certified for compliance with Windows 8 and …

Citrix introduces XenMobile MDM

Citrix announced XenMobile MDM, an enterprise mobile device management solution that gives users device choice while also enabling IT to meet its management and compliance …

Malicious URLs eclipsing botnets as malware distribution leader

McAfee Labs revealed that sophisticated attacks originally targeting the financial services industry are now increasingly directed at other critical sectors of the economy, …

25% of DDoS attacks in 2013 will be application-based

Twenty-five percent of distributed denial of service (DDoS) attacks that occur in 2013 will be application-based, according to Gartner. During such incidents, attackers send …

Security is top reason why IT adopts single sign-on

Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from …

FireMon expands situational awareness with Security Manager 7.0

FireMon announced new capabilities in Security Manager 7.0 that improve organizational ability to identify, understand and manage changes in security posture – in …

Cenzic Enterprise integrates with F5 BIG-IP ASM

Cenzic announced the direct API integration of the Cenzic Enterprise 7.0 suite of products with F5’s BIG-IP Application Security Manager(ASM) 11.3. With this combined …

Don't miss

Cybersecurity news