Please turn on your JavaScript for this page to function normally.
Antivirus solutions inadequate in detecting new viruses

Imperva collected and analyzed more than 80 previously non-cataloged viruses against more than 40 antivirus solutions. They found that less than 5% of anti-virus solutions in …

Staying safe if your IT security budget gets cut

As companies continue to struggle in today’s difficult economy, cutbacks affect all sectors of organizations. Unfortunately, IT security solutions are often not spared …

(IN)SECURE Magazine issue 36 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 36 has been released today. Table of contents: …

80% of attacks are redirects from legitimate sites

Sophos released its Security Threat Report 2013, a detailed and interactive assessment of what’s happened in IT security for 2012 and what’s expected for 2013. …

IAM solution for secure email on iOS devices

Good Technology introduced Good Vault, built on the Good Trust mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and …

LogRhythm launches automation suite for PCI

LogRhythm announced its Automation Suite for PCI. The suite helps organizations maintain continuous compliance and lower the costs of meeting PCI regulatory compliance …

Tumblr worm proliferated due to XSS flaw

Yesterday’s worm rampage that left many a Tumblr site “defaced” with a message by Internet troll group GNAA was the result of improper input sanitation. …

Wireless LAN platform for mobile application delivery

Aruba Networks announced a new wireless LAN platform that addresses the explosion of mobile applications and devices challenging enterprise networks, while dramatically …

Mass phishing emails a thing of the past?

PhishMe predicts that phishers will be changing their tactics in 2013 – resorting to targeted spear phishing emails rather than the mass mails of the past. Spear …

Risk study identifies top pain points in 2013

The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices …

Three major impacts when moving to a BYOD policy

Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …

Guidance Software unveils fast forensic bridge

Guidance Software announced the Tableau T35u USB 3.0 forensic SATA/IDE bridge for forensic imaging in both lab and field environments. The T35u supports write-blocked, …

Don't miss

Cybersecurity news