Please turn on your JavaScript for this page to function normally.
McAfee and RSA partner for compliance and risk management solution

McAfee and RSA announced a new joint solution which integrates security data from the McAfee ePolicy Orchestrator platform (McAfee ePO) with business infrastructure and …

Moving To The Cloud

Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors …

Week in review: Trojanized Netflix app, new Sony attack and German government’s Trojan/backdoor

Here’s an overview of some of last week’s most interesting news, articles and photos: Most social networks users don’t keep up with privacy settings changes …

When it comes to intrusions, size matters

A survey of enterprise IT managers and network administrators that has been conducted annually since 2005 shows that there has been a gradual increase in smaller enterprises …

Active response to database threats

AppSecInc announced DbProtect Active Response. Designed to provide an added layer of security around valuable and sensitive data, it gives organizations the flexibility to …

Improve payment security in-line with PCI DSS

NNT launched version 5 of its Change Tracker and Log Tracker Enterprise software suite. The software is specifically designed to improve payment security and protect against …

Risk I/O partners with Qualys SaaS platform

Risk I/O announced its partnership with Qualys. Under the partnership, the companies will integrate Risk I/O with QualysGuard, enabling users to easily detect and manage …

Digital Triage Forensics

Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield …

What threats can we expect in October?

Fraudulent online storefront promising cheap HP Touchpads, poisoned search engine results targeting users searching on Yahoo and Bing, and spam promising a US green card have …

How to conduct an internal audit according to ISO 27001 and BS 25999-2

The key purpose of an internal audit is for an organization to find out if all the processes and activities are running as they are expected. An nternal audit is usually …

Data security for businesses that don’t need a full security suite

Protecting sensitive data is an irreplaceable part of computer security. Useful tools for data encryption and shredding belong to the standard gear of TrustPort Total …

Security pros say that hackers have the upper hand

The numbers don’t lie: now, more than ever, security professionals feel outgunned by attackers and the level of automation employed in most campaigns against enterprise …

Don't miss

Cybersecurity news