Please turn on your JavaScript for this page to function normally.
Consensus IT security metrics

The Center for Internet Security (CIS) announced an updated release of its CIS Metrics, the industry’s first consensus metrics for information security. The release …

New vulnerability impacts Internet Explorer users

Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code …

New deep packet analysis technology

NetScout Systems announced Adaptive Session Intelligence (ASI) technology, a transformative real-time Deep Packet Analysis (DPA) engine that allows both enterprises and …

Measure, visualize and understand WLAN clients

AirMagnet released n (including the AirMagnet Planner module) and AirMagnet WiFi Analyzer PRO 9.0. Both products now include the company’s new multi-adapter solution, …

End-to-end data security

RSA announced its RSA Data Protection Manager product which combines tokenization and application encryption, two popular application-based controls, with advanced token and …

Protect login credentials with key stroke encryption

SutiSoft released SutiKSE, a security solution that protects data being entered on the keyboard. The solution helps protect against keylogging software and malware threats …

Smartphone security and privacy protection

With the rapid adoption of smartphones, concerns about security and privacy of data on the phone are increasing. Consumers realize that they have an extensive amount of …

No big bang in PCI 2.0

As expected, PCI 2.0 rolls up a number of minor changes, but there really is no Big Bang in this document. A number of people have been disappointed by this since for the past …

Free Mac anti-virus for home users

Sophos announced the availability of a free Mac anti-virus product for home users. Based on Sophos’s security software, which protects over 100 million business users …

Bluelog: Bluetooth site survey tool

Bluelog is a Linux Bluetooth scanner written to do a single task, log devices that are in discoverable mode. It is intended to be used as a site survey tool, determining how …

SOURCE Boston and Seattle CFP is now open

SOURCE Conference brings security experts and business professionals together in an intimate and personal environment to discuss the security industry’s most important …

Webroot acquires Prevx

Webroot has acquired Prevx and will integrate Prevx’s technology into its cloud security services. “Webroot and Prevx share a common vision for revolutionizing …

Don't miss

Cybersecurity news