Please turn on your JavaScript for this page to function normally.
Towards secure tokenization algorithms and architectures

Tokenization – the use of surrogate values for sensitive data – is all the rage. Although it is often sold as an alternative to encryption, it is at the core a …

Microsoft takes down Kelihos botnet

After having disrupted the operation of the Waledac and Rustock botnets, Microsoft has set its sights on a smaller one that is thought to be an attempt to rebuild the Waledac …

Advanced persistent threats, cloud security and mobile security to dominate RSA Conference Europe 2011

This is an interview with Linda Lynch, RSA Conference Europe Manager and Herbert “Hugh” Thompson, Ph.D, Chief Security Strategist, People Security and RSA …

10 actions to reduce IT infrastructure and operations costs

As many IT organizations are under intense pressure to continue to implement cost-cutting initiatives, Gartner has identified 10 actions that can reduce IT infrastructure and …

Multi-year study of real-world software security initiatives

The third major release of the “Building Security In Maturity Model” (BSIMM) study continues to add real-world data defining benchmarks for successfully developing …

IP Address Management platform Proteus 3.7 released

BlueCat Networks announced the latest release of Proteus, a scalable IP Address Management (IPAM) platform. Proteus 3.7 delivers enhanced usability, scalability, seamless …

Avoid mobile device geolocation risks

Twenty-eight percent of U.S. adults use location-based applications like Facebook and Google Maps, and that number will grow, according to ISACA. Regulating geolocation data …

McAfee All Access secures all Internet connected devices

A week after the Kaspersky One announcement, McAfee announced the availability of cross-device security solution that protects Internet-connected devices. McAfee All Access is …

New Ovum Technology report: Secunia VIM

How do companies operating diverse and wide-ranging systems solve their vulnerability management challenges? Not by using ad hoc tools, according to the new Ovum Technology …

CSA issues first Security as a Service white paper

The Cloud Security Alliance (CSA) announced that the Security as a Service working group has published its first white paper, “Defined Categories of Service 2011”. …

Enhanced enterprise mobility management platform

BoxTone announced an advancement to its EMM platform, delivering the first fully automated policy and compliance management engine with a real-time mobile security dashboard, …

Facebook changes raise serious security concerns

Facebook’s planned changes, while increasing interaction between users, could also flood the site with Twitter-style spambots and increase targeted attacks, according to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools