Please turn on your JavaScript for this page to function normally.
58 percent of software vulnerable to security breaches

Veracode released a “State of Software Security” report detailing vulnerabilities found in software that large organizations rely on for business critical …

Rugged and secure portable drive

Enova’s X-Wall FX provides the hardware real-time cryptographic capability to your entire SATA portable drive including SSD within a tightly integrated USB 2.0 and SATA …

Introducing SOURCE Conference Boston

SOURCE Boston is a security conference that brings security professionals and business leaders together, sails into the Boston’s Seaport Hotel April 21-23, 2010. The …

Protect every asset in the cloud infrastructure

Lieberman Software announced an enhancement to Enterprise Random Password Manager (ERPM) that now delivers fine-grain management features to protect every asset in the cloud …

Week in review: Twitter phishing, rogue software and Waledac botnet takedown

Here’s an overview of some of last week’s most interesting news and articles: 75% of organizations suffered a cyber attack 42 percent of organizations rate …

Mobile workforce shift will cause security headache

A recent iPass report highlights the rising numbers of workers are moving to a truly mobile working environment confirms what many in the IT security industry have suspected …

Security monitoring: Having vision for the future

Security attacks such as website hacking, security breaches and malware threats are all becoming increasingly common and sophisticated in design. The latest high-profile …

Cloud based Web application security assessment

Cenzic released ClickToSecure Cloud, a self-service, completely cloud based Web application security assessment solution. With this new cloud platform, Cenzic has created open …

International Secure Systems Development Conference

The International Secure Systems Development Conference, taking place in London during May 2010, addresses the key issues around designing-in security for standard and …

How to avoid rogue security software

What can you do to help prevent the spread of rogues and make sure that rogue software vendors stop profiting from their unscrupulous business? Follow these tips below to tell …

Attackers focusing on capturing personal data

Online criminals are garnering greater success with increased technical sophistication affecting a wider range of industries. With greater diversity and the use of targeted …

Hackers follow the money, IBM research shows

Existing threats such as phishing and document format vulnerabilities have continued to expand, even as users improve security, according to a new IBM report. The X-Force …

Don't miss

Cybersecurity news