Please turn on your JavaScript for this page to function normally.
In the “speed vs. security” battle, speed still wins

The increasing number and severity of recent data breaches and cyber attacks have made one thing clear among major corporations and government entities: developing a strong …

Recent HIPAA/HITECH changes

As part of the American Recovery and Reinvestment Act of 2009, Congress enacted the Health Information Technology for Economic and Clinical Health (HITECH) Act to broaden and …

Secure platform for connected mobile devices

AuthenTec introduced its new SafeZone secure platform solution for mobile and consumer systems on a chip (SoCs). The SafeZone Secure Platform solution allows chip makers and …

New business security products from G Data Software

G Data Software announced the availability of its Version 11 product line, enhanced to provide businesses with the most up-to-date technology for protection across their …

NetSecL Linux 3.2 released

NetSecL is a hardened, live and installable operating system based on OpenSuse suitable for desktop/server and penetration testing. Once installed you can fully enjoy the …

Vulnerable firmware could destabilize Internet-enabled technologies

Kill switches and backdoors inserted at the point of manufacture could act as a conduit for organized criminals or foreign states to access internet-enabled devices, according …

Active Directory Change Reporter 7.0 released

NetWrix released Active Directory Change Reporter 7.0 which automates auditing of who changed what, when and where in Active Directory, Group Policy and MS Exchange, for …

Week in review: Booz Allen Hamilton breach, Google+ related scams and malware ecosystems

Here’s an overview of some of last week’s most interesting news and articles: “Casey Anthony confession video” scam spreads The verdict in the …

Verizon takes on issue of stolen credentials

Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …

Secure mobile device access on single authentication platform

SafeNet announced its new mobile device credentialing solution that enables the secure use of consumer mobile devices on corporate networks. SafeNet’s Authentication …

Mitigating software vulnerabilities

Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …

Practical steps to improve your corporate security posture

Sony, Lockheed Martin, Nintendo, Groupon – In fact we could go on and on. Financial services, government agencies, health care records – It doesn’t matter. …

Don't miss

Cybersecurity news