Help Net Security
Encrypted text messaging for BlackBerry and Android
ProtectedSMS enables BlackBerry and Android users to exchange secure, encrypted text messages with individuals who have installed the software. Unlike other secure texting …
Most employees would steal confidential company information
The majority of IT staff and C-level executives would definitely take confidential company information when they left their organization, according to Cyber-Ark. Despite 66% …
Dramatic increase in cyberattacks on critical infrastructure
A survey of 200 IT security executives from critical electricity infrastructure enterprises in 14 countries found that 40 percent of executives believed that their …
Regulatory compliance is a top concern in 2011
Regulatory compliance will be the top business issue affecting enterprise IT in the next 12 months, according to a new survey of more than 2,400 ISACA members from 126 …
Dimension Data partners with Qualys
Qualys announced that Dimension Data will offer the QualysGuard IT Security and Compliance Suite as part of its portfolio of solutions to organizations around the globe. As a …
Universal Fuzzer combines 15 different fuzzers
Codenomicon release its Universal Fuzzer, a fuzz testing solution that combines heuristics and multiple fuzzers with a graphical user interface, automated test executions and …
3TB hardware encrypted drive with PIN code access
iStorage released their Desktop Secure Hard Drive which comes with a robust, shock-proof design and 256-bit AES hardware encryption, which encrypts data on the fly as fast as …
Secure access for any device with Cisco
Cisco introduced new security, management, and video solutions to its Borderless Networks portfolio to help information technology departments more efficiently manage the …
DARPA invests $4.9M towards secure cloud computing
The Defense Advanced Research Projects Agency (DARPA) has awarded $4.9M to Galois, Inc., as research integrator for the PROCEED program (Programming Computation on Encrypted …
Green IT to become a priority
Green IT initiatives will take on added importance in the next few years as more organizations commit financial resources and develop comprehensive strategies, according to a …
Cybercriminals shifting to smaller, more opportunistic attacks
Data loss through cyber attacks decreased sharply in 2010, but the total number of breaches was higher than ever, according to the “Verizon 2011 Data Breach …
Software industry risks and SQL injection trends
With the trend of targeted cyber attacks along with the exploitation of common vulnerabilities such as SQL injection, it is clear that the core software infrastructure of …