Please turn on your JavaScript for this page to function normally.
Secure access to Office 365 cloud-based web applications

RSA SecurID can now be integrated with the Windows Active Directory Federation Services 2.0 (AD FS 2.0). This integration can enable organizations to provide secure user …

Access Windows using your iPad and iPhone

Leostream Connect enables users to access secure and reliable Windows desktops and applications directly from their iOS device. This application allows an increasingly mobile …

20-fold increase in fraudulent spam

In Q3 2011, the percentage of fraudulent emails in spam traffic increased twenty times, rising from 0.1 per cent last quarter to 2 per cent of all spam traffic in Q3. The …

Browser bloat and privacy concerns

An increase in browser-based bloat and malware, and growing concern over online tracking technology, will top the technology trends in 2012, according to SlimWare Utilities. …

McAfee updates its Cloud Security Platform

McAfee announced the latest enhancements to its Cloud Security Platform which secures all primary channels of traffic – email, web and authentication – moving …

You can count on IT failures

A worrying 60 per cent of respondents surveyed by City Lifeline at this year’s IP Expo have lost access to the company’s IT system following an unexpected …

Barracuda Link Balancer XSS vulnerabilities

Two vulnerabilities have been reported in Barracuda Link Balancer, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. …

GFI Software cloud-based anti-malware and anti-spam email security

GFI Software announced that GFI MailEssentials Complete Online, a cloud-based anti-malware and anti-spam email security solution, is now available to small and medium …

Week in review: Study of hacker forums, creating effective CAPTCHAs, and trust relocated for yet another CA

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Irresponsible IT disposal methods Although data security is the …

Focusing on new technologies instead of security threats

In the rush to utilize new technologies and move into the increasingly borderless world of cloud computing, mobile devices and social media, a growing gap is developing …

Most firms don’t coordinate security planning

Despite the potentially crippling impact of security events on corporate performance, many executives report that their security function is not well coordinated with …

New analytics advance IBM security intelligence portfolio

IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …

Don't miss

Cybersecurity news