Please turn on your JavaScript for this page to function normally.
RSA and Bit9 team to accelerate cyber forensics investigations

Bit9 announced an agreement with RSA to integrate Bit9’s cloud-based software reputation service with RSA NetWitness Spectrum Live service. Under terms of the agreement, …

Next Level Security Systems releases new security management platform

Next Level Security Systems announced the expansion of its NLSS Gateway product suite with the introduction of the NLSS Gateway 5000, an enterprise-class unified appliance …

Web apps experience 2,700+ attacks per year

The median annual attack incidents on the 50 Web applications observed was 274 times a year, with one target experiencing more than 2,700 attack incidents. According to a new …

Join the Smart Grid Security Virtual Summit

On Thursday, August 9, Smart Grid Observer will host a full-day Smart Grid Security Virtual Summit. The event brings together a range of top utility practitioners and security …

Spam filtering tools fail short with phishing attacks

Enterprise users receive unfiltered phishing messages nearly every day of the week, and most of them are not properly trained to recognize or safely react to them, according …

Trend Micro unleashes big data analytics

Trend Micro announced an expansion of the Trend Micro Smart Protection Network, the cloud-based security infrastructure that powers most of the company’s products and …

SignatureLink introduces all-in-one ecommerce fraud solution

Until now, ecommerce fraud solutions accomplished one objective: screen out online payment fraud based on site visitor behaviors, devices, and other criteria. The …

Alert Logic launches SaaS web application firewall

Alert Logic announced the availability of Alert Logic Web Security Manager with ActiveWatch to protect web applications against threats and attacks. The solution combines WAF …

Threats and protection issues of cloud data

Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …

Quantum cryptography theory has a proven security defect

Researchers at Tamagawa University, Quantum ICT Research Institute, announced today that they had proved the incompleteness and limit of the security theory in quantum key …

GFI MailArchiver 2012 tackles email storage and data leakage

GFI Software announced the availability of GFI MailArchiver 2012 that offers new reporting capabilities to guard against data leakage of sensitive information, such as social …

New version of Palamida’s scanning solution for open source projects

Palamida recently announced Enterprise Edition 6, the latest edition of its open source intellectual property and vulnerability risk management product. The new version adds a …

Don't miss

Cybersecurity news