Please turn on your JavaScript for this page to function normally.
Cenzic Enterprise integrates with F5 BIG-IP ASM

Cenzic announced the direct API integration of the Cenzic Enterprise 7.0 suite of products with F5’s BIG-IP Application Security Manager(ASM) 11.3. With this combined …

Check Point introduces high-performance data center security appliance

Check Point launched its new 21700 Appliance with 78 Gbps of firewall throughput, 25 Gbps of IPS throughput and a 2,922 SecurityPower unit (SPU) rating. Security gateways must …

$400 million risk lurking inside global enterprises

Ponemon Institute and Venafi announced a new report provides an extensive examination of how failure to control trust in the face of new and evolving security threats places …

12.6 million identity fraud victims identified in the U.S.

In 2012 identity fraud incidents increased by more than one million victims and fraudsters stole more than $21 billion, the highest amount since 2009, according to Javelin …

How CSOs are enabling secure BYOD

Wisegate released a new report that answers the industry’s most complex “Bring Your Own Device” (BYOD) questions while providing expert insight to help CSOs …

Tips to overcome PHI security obstacles

Healthcare organizations’ privacy programs are still understaffed and underfunded, even while millions of patients’ protected health information (PHI) are …

SmishGuru simulated attack service launches

Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing …

Alert Logic releases new log manager

Alert Logic announced a new release of Log Manager which enables real-time security monitoring of critical security logs. By combining correlation with on-the-fly parsing of …

Qualys CEO to address security in a hyperconnected world at RSA Conference 2013

Qualys Chairman and CEO Philippe Courtot will examine the evolution of security in a hyperconnected world in his keynote at RSA Conference 2013. Courtot’s keynote, which …

Security pros should listen with their heads, not their hearts

There is a phrase that has become quite popular in information security circles and it goes along the lines of “there are two types of organizations, those that have …

The sophistication of risky apps, mobile misbehavior and spyware

McAfee released the results of a new report, documenting sophisticated and complex risky apps containing multi-faceted scams, black market crimes, drive-by downloads and …

F5 Networks releases hybrid cloud solution for mobile application management

F5 Networks announced F5 Mobile App Manager, a new hybrid cloud solution for mobile application management that enables organizations to safely support enterprise BYOD …

Don't miss

Cybersecurity news