Please turn on your JavaScript for this page to function normally.
iAlertTag wirelessly secures, alerts, and locates your iPhone

Cirago International released its new iAlertTag (IAT1000), a solution for finding a lost iPhone, keeping an iPhone close by or locking your Windows laptop. iAlertTag creates a …

Intel partners with VMware for cloud security

Although companies are expanding their use of cloud computing to realize improved agility and efficiencies, concerns about security remains a top barrier to adoption. Intel …

Kingston unveils new enterprise-class SSD

Kingston Digital announced the SSDNow E100 SSD, a new SSD which enables enterprises to accommodate the performance demands required in support of big data and virtualization …

Mikko Hypponen: Where are we and where are we going

Mikko Hypponen is the Chief Research Officer at F-Secure. Here you can watch his keynote at this year’s Hack In Paris conference.

Data protection for the cloud with ProtectV

As more data moves to private or public clouds, the number of super-users with access to an organization’s data multiplies, the risk of VMs being copied without the …

Cyber incident reporting in the EU

ENISA took a snapshot of existing and future EU legislation on security measures and incident reporting. Their analysis underlines important steps forward, but also identifies …

Smart Grid Infrastructure & Networking

With contributions from more than 30 experts, Smart Grid Infrastructure & Networking describes cutting-edge technologies for connecting the electrical power …

Week in review: Multi-platform malware, new trends in BYOD, and Google setting up privacy team

Here’s an overview of some of last week’s most interesting news, articles and reviews: 92% of the top 100 mobile apps have been hacked Ninety-two percent of the …

Proactive or reactive: Should that be the question?

For a number of years digital forensics has referred to “the application of computer investigation and analysis techniques to gather evidence suitable for presentation …

Safe Money technology protects online purchases

It’s no secret: most cybercriminals don’t want online fame, they want your money. Kaspersky Lab research shows that each day, more than 1,400 new pieces of banking …

DDoS attacks protection advice from the EFF

Denial of service (DoS) and distributed denial of service (DDoS) attacks are increasingly common phenomena, used by a variety of actors—from activists to governments—to …

IDC finds increased adoption of storage efficiency technologies

The rapid increase in the amount of digital data that needs to be stored is pressuring organizations to increase capital expenditures associated with the acquisition of …

Don't miss

Cybersecurity news