Please turn on your JavaScript for this page to function normally.
You’ve been hacked, now what?

Given the increased frequency and complexity of cyber attacks on business networks of all sizes, the odds of experiencing a breach is almost guaranteed if the right security …

Controlling the physical world with BacNET attack framework

The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often …

SugarCRM unveils fast private cloud

SugarCRM announced Sugar Private Cloud, a flexible deployment option that gives companies a dedicated, managed private instance of SugarCRM’s Customer Relationship …

ZeroAccess Bitcoin botnet shows no signs of slowing

FortiGuard Labs observed that the Bitcoin mining botnet, ZeroAccess, was the number one threat last quarter. Their report also reveals new analysis of the South Korea …

Real-time detection and response to unauthorized access

Organizations today face an ever-increasing number of security threats from internal privileged users and external attackers, including APTs. SIEMs are only part of the …

Rackspace launches Mobile Cloud Stacks

Rackspace released its new mobile cloud stacks for developers. These stacks are purpose built to help developers design, build, test, deploy and scale mobile apps in the …

Entrust updates IdentityGuard Mobile Credential

Entrust announced updates to its mobile smart credential. In addition to offering a multi-purpose digital identity for secure physical, logical and cloud access, the Entrust …

Avere unveils hybrid storage appliance

Avere Systems announced the Avere FXT 3800. This hybrid Edge filer contains both Flash/SSD media and Serial Attached SCSI hard drives (SAS HDD) and delivers significant …

A call to arms for infosec professionals

An old saying says “nature abhors a vacuum,” meaning that in the absence of something nature will find a way of filling that gap. We are currently witnessing the …

Beyond BYOD: Companies need to change

Organizations seeking to maximize the economic and productivity benefits made possible by mobile technologies must look beyond simply which devices are used and re-examine …

Risks to retailers through point of sale systems

McAfee released a report on the growing risks the industry is facing with both legacy and newer point of sale systems (POS). The report discusses how the retailing …

Secure Microsoft Office collaboration via any device

WatchDox Apps for WatchDox Enterprise and Enterprise ES is the first offering to grant enterprise users secure Microsoft Office collaboration capabilities via any desktop, …

Don't miss

Cybersecurity news