Please turn on your JavaScript for this page to function normally.
IBM releases software for developing secure mobile apps

IBM announced new software to help organizations develop mobile applications that are more secure by design. Now, clients can build security into the initial design of their …

CloudProtect: Insurance for cloud computing risks

To assist companies in managing the risks associated with cloud computing, Marsh announced an insurance solution designed to protect companies against first-party losses …

RDX media with built-in encryption technology

Imation announced the availability of Imation RDX Media Secure with CyberSafe Pro Security Technology, the first RDX media with built-in encryption and cryptographic erase …

Web Application Security, A Beginner’s Guide

Web Application Security, A Beginner’s Guide imparts the hard-learned lessons and experiences of top security professionals, and provides know-how that can otherwise …

Real-time mobile vulnerability management

Mobilisafe launched its cloud-based Mobile Risk Management (MRM) solution, enabling IT to identify and eliminate the significant risks associated with the …

Passing the internal scan for PCI DSS 2.0

Merchants subject to Payment Card Industry Data Security Standard (PCI DSS) rules are often blindsided by DSS changes, arrival of new payment technologies, and newly emerging …

Consumers confused about data breaches

A business’s ability to protect personal information and communicate the circumstances of a data breach can impact customer loyalty and an organization’s …

Siemens enhances security of industrial networks

Siemens announced new versions of its Simatic NET CP 343-1 Advanced and Simatic NET CP 443-1 components with integrated security functions to enable companies to enhance the …

iOS app creates different personas on social networks

Have you ever decided not to post an update because you didn’t want your entire social network to be privy to every intimate detail of your life? Of course you have. …

Information Storage and Management

Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …

Week in review: New cyber weapon Flame, gamers under attack, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Privacy trends affecting security In this podcast …

Privacy practices of the Internet’s biggest companies

When you use the Internet, you entrust your thoughts, experiences, locations, and more to companies like Google, Twitter, and Facebook. But what happens when the government …

Don't miss

Cybersecurity news