Please turn on your JavaScript for this page to function normally.
Most effective ways to stop insider threat

Imperva examined the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a …

Qualys extends QualysGuard Cloud Platform

Qualys announced that QualysGuard Vulnerability Management will now feature vulnerability prediction capabilities within a new dashboard and threat reports for zero-days and …

Entrust IdentityGuard delivers mobile smart credentials

To enable organizations to secure and leverage mobile devices in the wake of BYOD trends, Entrust extends its identity-based security platform with Entrust IdentityGuard …

Industry-by-industry cybercrime snapshots

Verizon released a series of industry-by-industry snapshots of cybercrime aimed at helping organizations better understand the anatomy of a data breach and how to best provide …

Top 10 strategic technology trends for 2013

Gartner highlighted the top 10 technologies and trends that will be strategic for most organizations in 2013. Gartner defines a strategic technology as one with the potential …

Protecting print devices from malware

Xerox and McAfee revealed new protection against malware and viruses with the first networked multifunction printer to use McAfee Embedded Control software, a filtering method …

TeamMentor: Secure software development knowledge base

Security Innovation released TeamMentor 3.2, a SaaS product that provides guidance to help security and development teams create secure software out of the box, along with …

LANDesk delivers secure user management suite

LANDesk Software announced LANDesk Secure User Management Suite, a solution aimed at helping IT professionals gain control of a mixed environment of users, devices and …

Cloud Security Alliance guidance for data ownership

The Cloud Security Alliance has incorporated in recently-released implementation guidance issued by the Security as a Service Working Group a set of recommendations for cloud …

Windows 8 Bible

Windows 8 is a new version of Microsoft’s flagship operating system and it’s packed with exciting new features. From the new Windows lock screen and the new …

Rackspace launches Cloud Block Storage, powered by OpenStack

Rackspace announced Cloud Block Storage, powered by OpenStack. This solution provides an approach to attached storage in the cloud by addressing customer demand for …

Top five tips for network protection

This year has seen a continued rise in targeted attacks and insider threats designed to steal confidential data. Nowadays, any organization that houses valuable intellectual …

Don't miss

Cybersecurity news