Please turn on your JavaScript for this page to function normally.
The value of your credentials

As surprising as this may sound, earlier this year stolen twitter credentials were valued at almost $1,000. When compared to credit card details that fetch less than $1, why …

Photos: RSA Conference Europe 2010

RSA Conference Europe 2010 at a glance: keynotes, presentations, mingling on the expo floor.

Portable device management and protection for Mac users

Cososys has released Endpoint Protector 2009, a new version of its device management, endpoint security and data loss prevention solution for Mac/Apple computers. The newly …

Dangers of wireless network use still unknown to many

Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a new study. In an ‘ethical hacking’ experiment conducted across six UK …

Agentless configuration auditing

nCircle announced the new version of its Configuration Compliance Manager, an agentless configuration auditing and file integrity monitoring solution that automatically …

Poor password practices and how to change them

When it comes to safeguarding personal information online, many people leave their virtual keys in the front door. A survey of more than 2,500 people from the United States, …

Full-service virtual SIEM solution

LogLogic announced the release of a full-service virtual SIEM solution. Leveraging the recently released LogLogic 5 software, LogLogic’s MX Virtual delivers all the …

Oracle’s critical patch update advisory for October 2010

Oracle just released a new Critical Patch Update, a collection of patches for multiple security vulnerabilities. The update also includes non-security fixes that are required …

49 vulnerabilities fixed in record Patch Tuesday

In today’s mammoth Patch Tuesday, Microsoft delivers 16 security bulletins that address 49 vulnerabilities affecting Windows, Internet Explorer, Microsoft Office, and …

Data retention system for cyber investigative operations

Bivio Networks announced the launch of its Data Retention System, a data collection and retention system to strengthen cyber security operations for network operators and …

Questions to ask of a cloud provider

At the RSA Conference Europe 2010, the Cloud Security Alliance (CSA) released version 1.0 of the Consensus Assessments Initiative Questionnaire. The questionnaire is available …

RSA offers complete threat management solution

RSA, the Security Division of EMC, announced a set of core technologies and services designed to help organizations more effectively manage information risk and IT compliance …

Don't miss

Cybersecurity news