Please turn on your JavaScript for this page to function normally.
Secure data with cloud-based encryption

Porticor introduced its Virtual Private Data (Porticor VPD) system, a solution combining data encryption with patented key management to protect critical data in public, …

The Internet of Things: Key Applications and Protocols

The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …

The rise of information stealers and pay-per-install malware

The fastest growing malware categories in the second half of 2011 were PPI (Pay-Per-Installs) and information stealers that target user credentials enabling the theft of key …

ISO 27001 video tutorials

One of the biggest obstacles for companies starting to implement ISO 27001 is writing various documents required by this information security standard. Information Security …

Confidential data at risk even with policies in place

Think confidential information is protected by company IT security policies? Think again. A new survey by Xerox and McAfee, reveals that more than half of employees say they …

Intel details next-generation communications platform

Intel disclosed several features for the company’s next-generation communications platform, codenamed Crystal Forest. The platform will handle data processing across the …

Protect data by finding forgotten databases

Application Security declared that organizations can no longer afford to guess or assume that they have their database inventory under control. Based on the premise that you …

Practical Malware Analysis

Malware. You know what it is. Perhaps you’ve even fought a malware infection or two. Wouldn’t it be nice if the good guys finally had one really complete guide to …

Web filtering technology with next-generation firewall capabilities

Barracuda Networks announced the integration of the Barracuda NG Firewall and Barracuda Web Security Flex. This solution combines cloud-based Web filtering technology with …

Open source password manager gets two-factor authentication

Yubico announced a successful implementation of YubiKey two-factor authentication with the free, open source password manager software Password Safe. The joint solution offers …

February Patch Tuesday lighter than expected

It turns out that this February Patch Tuesday is lighter than we had anticipated. Some of the nine bulletins should be less worrisome to IT admins: the Office vulnerability …

Gap in patch priorities vs cybercriminal targets

Internet users are at risk from the rapid growth in software security flaws – specifically end-point vulnerabilities. Businesses should be doing far more to help …

Don't miss

Cybersecurity news