Please turn on your JavaScript for this page to function normally.
Automated security analytics and protection

Network security teams face the task of protecting networks with disparate tools that are limited, slow and labor intensive. Multi-stage attacks executed by diligent cyber …

Webroot delivers endpoint protection

The security landscape has changed and traditional signature-based software can’t keep up. A recent study of IT decision makers found an overwhelming 95 per cent …

Malware surpassed 75 million samples in 2011

McAfee released its latest threats report, revealing that malware surpassed the company’s estimate of 75 million unique malware samples last year. Although the release …

New solution and certification addresses the BYOD challenge

Aruba Networks introduced ClearPass, an access management system for the secure provisioning of mobile devices on any enterprise network. It’s designed to enable IT …

Multi-layered cloud security for banks

ActivIdentity announced integrated fraud detection service and authentication capabilities for its 4TRESS Authentication Appliance. The all-in-one platform and cloud-based …

What is ISO 27001?

Learn the basics of information security and how to use ISO 27001 as a framework for managing information security management system. For more information and training, check …

Security and SLAs, the biggest barrier to cloud adoption

45% of European IT decision makers view a lack of security and service level agreements (SLAs) as top concerns for moving to the cloud, according to a survey by Interxion. …

Trend Micro makes HijackThis open source

Trend Micro released HijackThis as an open source application. The code, originally written in Visual Basic, is now officially available at SourceForge. HijackThis scans your …

Acunetix Web Vulnerability Scanner 8 released

Acunetix Web Vulnerability Scanner 8 (WVS) echoes years of counter-hacking experience through its new ability to lock hackers out by integrating scan results into …

Forensic toolkit with malware analysis technology

AccessData released Forensic Toolkit 4 (FTK) that gives organizations affordable access to more advanced incident response and remote investigative capabilities. Using FTK, …

Week in review: Cheap cellphone tracking, Apple’s Gatekeeper, and Google secretly bypasses Safari’s “no tracking” settings

Here’s an overview of some of last week’s most interesting news and articles: Privacy pitfalls of online dating It used to be that you were pretty much anonymous …

How mobile malware is maturing

Mobile malware has reached a new stage of maturation, according to Juniper Networks. Top findings from Juniper’s 2011 Mobile Threats Report are evidence of accelerating …

Don't miss

Cybersecurity news