Please turn on your JavaScript for this page to function normally.
Securing virtual environments and reducing malware risk

Rapid7 announced that the new version of its vulnerability management solution, Nexpose 5.0, will address the complex security challenges presented by the wide scale adoption …

New versions of Trend Micro enterprise data protection software

Trend Micro now offers completely integrated data protection for messaging and collaboration systems providing many feature advantages for security professionals. ScanMail for …

Smartphone and tablet security tips

ICSA Labs is offering a series of tips that businesses and consumers can use to protect themselves from security risks aimed at smartphones, tablets and apps. 1. Only buy apps …

Data seepage from the corporate boundary

In a growing number of cases, Internet-facing business systems do not always reflect a well maintained, up-to-date security profile, and, as one would expect they are, by …

Week in review: Windows 8 security features, the end of DigiNotar and BIOS rootkit in the wild

Here’s an overview of some of last week’s most interesting news: Linux Foundation suffers security breach A few weeks after the discovery of the compromise of the …

Most dangerous celebrities in cyberspace

Heidi Klum has replaced Cameron Diaz as the most dangerous celebrity to search for on the Web, according to McAfee. For the fifth year in a row, McAfee researched popular …

Evolving cyber threats continue to drive security strategy

43 percent of global companies think they have an effective information security strategy in place and are proactively executing their plans, placing them in the category of …

NFC-enabled BlackBerry smartphones will “open doors”

HID Global plans to support the company’s iCLASS digital keys and mobile secure identity on NFC-enabled BlackBerry smartphones. The new BlackBerry Bold 9900/9930 and …

Data mapping and masking requirements

A new study of 3,765 publicly disclosed breach incidents shows they resulted in financial losses of more than $156 billion. Published by the Digital Forensics Association, the …

Data loss management SaaS

Co3 Systems announced an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more …

When scammers socialize

A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …

Security case for iPhone 4

BungeeAir is based on a wireless technology that instantly creates a connection between your iPhone and a compact key fob to create a security tether keeping your phone and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools