Please turn on your JavaScript for this page to function normally.
F-Secure advances fight against exploits

Exploitation of software vulnerabilities has become one of the most popular ways to gain access to users’ machines, but F-Secure is reinforcing its exploit defenses with …

Account takeover attempts have nearly doubled

ThreatMetrix announced its Cybercrime Index, a series of Web fraud data aggregated from 1,500 customers, 9,000 websites and more than 1.7 billion cyber events. In a recent …

It takes 10 hours to identify a security breach

Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee. The ability to detect data breaches within …

Cisco teams with IBM, Lancope, LogRhythm, Splunk and Symantec

Cisco introduced new developments with security partners and information-sharing techniques under its Cisco Security Technology Partner Ecosystem. Enabled by a new context …

Secure automated archiving from Imation

Imation launched its next generation object store, the Nexsan Assureon secure automated archive solution. It brings secure automated archiving to mid-sized organizations and …

Red Hat unveils OpenStack certification and solution marketplace

Red Hat’s OpenStack Cloud Infrastructure Partner Network now boasts more than 100 global technology industry leaders as members, including Bull, Dell, Fujitsu, Hitachi, …

Week in review: Reactions to PRISM, and the question of whether or not to hack back

Here’s an overview of some of last week’s most interesting news, articles and reviews: The future of online authentication Recently, Twitter has introduced …

Automated analysis of essential security controls

EiQ Networks announced ThreatVue, an out-of-the-box security monitoring solution that automates the implementation, analysis and remediation guidance of essential security …

In-house control and encrypted voice calls

Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …

Large orgs in denial about own security breaches?

Over two thirds (66%) of large organizations said they either had not experienced a security incident in the last 12-18 months or were unsure if they had, a recent Lancope …

Americans were anxious about privacy even before NSA spying scandal

Big Brother is watching and Americans know it. New figures from the quarterly Allstate/National Journal Heartland Monitor Poll show that most Americans exhibit a healthy …

Eight charged for hacking global financial institutions

Eight alleged members of an international cybercrime, money laundering and identity theft conspiracy have been federally charged in New Jersey with a scheme to use information …

Don't miss

Cybersecurity news