Please turn on your JavaScript for this page to function normally.
U.S. developing plan to regulate critical infrastructure company cyber defense

A Senate plan to boost the US government’s ability to regulate the security of companies responsible for critical industries is causing debate as to exactly how far its …

Planning for IPv6

With IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level …

The state of cyberwar in the U.S.

As a country that is used to being dominant in the more traditional sense, the U.S. has been working to come to grips with a new sense of supremacy as a result of cyber …

Quick response, quick risk?

You don’t have to look far these days to spot a QR code. From their humble beginnings in labeling and tracking parts used in vehicle manufacturing, these blocky little …

Simple steps to ensure online safety

Resent research into internet use by teenagers conducted for GFI Software revealed that one in three parents do not know if Internet safety tips are being taught to their …

Smaller DDoS attacks can be deadlier than big ones

Contrary to conventional thinking that large bandwidth cyber attacks wreak the most damage on enterprises, security experts at Radware instead found that bigger problems …

Windows privilege management with enterprise reporting capabilities

Avecto has unveiled the latest version of its Privilege Guard technology, developed to enable organizations to give all users the privileges they need to remain productive …

CRISC certification: Reacting to a radically changing IT landscape

The number of IT professionals seeking the CRISC (Certified in Risk and Information Systems Control) certification continues to rise rapidly. More than 16,000 professionals …

Week in review: Reactions to VeriSign hack, Anonymous leaks FBI conference call, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: The F-BOMB: A tiny $50 spying computer for DARPA As …

Attackers use fake friends to blend into Facebook

A new Barracuda Labs study provides an example of an increasing number of attackers move to social networks to carry out their wares. The study analyzes a random sampling of …

The fusion of hardware encryption, PIN access and USB 3.0

Apricorn expanded their Aegis Secure Drives to the desktop environment with a new desktop edition, the Aegis Padlock. Sporting a spacious capacity of up to 3 TB with a Super …

Netop updates remote support and management solution

Netop unveiled the latest version of its remote support product, Netop Remote Control 11. Now with a new secure tunnel option, customers can extend their support and …

Don't miss

Cybersecurity news