Please turn on your JavaScript for this page to function normally.
Week in review: New and improved TDL4 rootkit, and the danger behind low-volume email attacks

Here’s an overview of some of last week’s most interesting news, reviews and articles: Info-stealing Trojan posing as Panda Cloud Antivirus The file – named …

Assess and monitor SAP security with ERPScan

ERPScan released the version 2.1 of their Security Scanner for SAP, which is currently the only solution on the market to assess and monitor 3 tiers of SAP security: …

Human generated big data

Human generated content is comprised of all the files and e-mails that we create every day, all the presentations, word processing documents, spread sheets, audio files and …

Biometric authentication service for web and mobile service providers

BioID announced BioID Connect, a cloud-based biometric authentication service that providers of web, cloud and mobile services can easily integrate to offer their users …

nCircle releases Configuration Compliance Manager 5.13

nCircle announced its Configuration Compliance Manager 5.13. This release adds the ability to audit MySQL and Microsoft Windows Server Internet Information Services (IIS) 7 …

Qualys expands QualysGuard PCI cloud platform

Qualys has expanded QualysGuard PCI to assist organizations of all sizes to meet Payment Card Industry (PCI) Data Security Standards (DSS), including new internal scanning …

Record privileged sessions in Password Manager Pro

ManageEngine announced the immediate session recording capabilities in its privileged password management software, Password Manager Pro. Now, privileged sessions launched …

Whonix: Anonymous operating system

Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware …

Security industry needs a healthy job market

The information security industry is facing an inflationary spiral, which is both unsustainable and bad for the economy as the skills gap in information security continues to …

Cloud provider assurance: Trust but verify

Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and cloud privacy and compliance …

Voter database security is a myth

Some of us spend days and months of indecision, hours in front of the TV watching campaign commercials and presidential debates, researching on the Net, mulling the options …

5 tips for effective disaster recovery

David Mount, technical director at NetIQ, has highlighted 5 tips that will help businesses implement effective disaster recovery plans for their all important IT assets. Am I …

Don't miss

Cybersecurity news