Please turn on your JavaScript for this page to function normally.
Cloud computing trust-based security

Trusted Computing Group, which develops industry standards for hardware-based security rooted in trust, announced an effort to extend the concept of trust to cloud-based …

“Here you have” virus authors may be based in Spain

The “Here you have” virus, which first appeared about a month ago, is a worm that has spread widely via email using social engineering (the name of the virus stems …

New data security software from IBM

Today, organizations are struggling to manage a variety of complex data security threats, from misuse by insiders or cyber criminals outside the company. Combined with an …

How CIOs can get things done with their reduced staff

It seems to me that we’re seeing more and more news of late about the lackluster job outlook. Unemployment will continue to be higher than originally forecasted and …

HP to acquire ArcSight

HP and ArcSight have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of …

Browser protection against Web-borne threats

Invincea Browser Protection safeguards enterprise PCs against all types of web-borne threats by moving web browsers—the entry point for most malware—into a virtual …

Vulnerability assessment for databases

Sentrigo announced a fully integrated database activity monitoring and vulnerability assessment solution for enterprises. Hedgehog Enterprise 4.0 provides a complete database …

Week in review: Inside a CERT, hotel systems breach and DHS network security holes

Here’s an overview of some of last week’s most interesting news, articles and videos: Behind the scenes and inside workings of a CERT Brian Honan is the founder …

Rogue employees sell passport data of World Cup fans

Reports are coming in that the Information Commissioner’s Office has started investigating FIFA, the world football governing body, over allegations that details of …

Incentives and challenges for cyber security information sharing

The European Network and Information Security Agency (ENISA), launched a new report on barriers to and incentives for cyber security information sharing. It shows that the …

Be careful what you reveal online

In the video below, Trend Micro CTO Raimund Genes discusses how an attacker can use information from social networks such as LinkedIn and Facebook to hack into a corporate network.

Multiple vulnerabilities in Cisco Wireless LAN Controllers

Cisco WLCs and Cisco WiSMs are responsible for system-wide wireless LAN functions, such as security policies, intrusion prevention, RF management, quality of service, and …

Don't miss

Cybersecurity news