Please turn on your JavaScript for this page to function normally.
A third of IT staff snoop at confidential data

Exercise extreme caution when it comes to dismissing employees with knowledge of your IT systems. Cyber-Ark’s annual survey around “Trust, Security & …

More malware blocked in July 2008 than in the whole of 2007

In its Global Threat Report ScanSafe reported that the total number of Web-based malware blocks has increased by 87 per cent in July 2008 compared to the previous month. …

Panda Security launches its 2009 antivirus products

Panda Security has launched its 2009 range of antivirus solutions for the consumer sector. The product line-up comprises Panda Antivirus Pro 2009, Panda Internet Security 2009 …

BT enhances security monitoring service

BT announced the enhancement of its global Event Monitoring and Correlation service to further defend enterprise networks against the growing threat of malicious botnet …

Wireless DTCP content protection specification

The Digital Transmission Licensing Administrator (DTLA) has approved and published a new supplement to the Digital Transmission Content Protection (DTCP) Specification for the …

Application Security Matters: Deploying Enterprise Software Securely

One of the most interesting aspects of being an information security consultant is the exposure to an enormous variety of industries and organizations. From health care to …

HNS Book giveaway: “The Best of 2600 – A Hacker Odyssey”

We are giving one of our readers a copy of “The Best of 2600 – A Hacker Odyssey“. Since 1984, the quarterly magazine 2600 has provided fascinating articles …

Most organizations fail to stop interior network threats

A survey by Opine Consulting revealed nearly half of the IT professionals who responded had endpoints connecting to their corporate networks without their knowledge. Yet …

A multivendor open automation framework

The IP networking industry is rapidly introducing more intelligent systems. This new breed of network offers a wide array of converged services extending from routing and …

External hard drives with RFID security key data encryption onboard

Aluratek announced the availability of its new Tornado plus line of external hard drives featuring built-in radio frequency identification (RFID) security key data encryption, …

Security breaches blast through the 2007 record

The total number of breaches on the Identity Theft Resource Center’s 2008 breach list has surpassed the final total of 446 reported in 2007 — more than four months …

Best Western releases a statement on the supposed security breach

Sunday Herald reporter Iain S Bruce wrote a piece on the “world’s biggest cyber heist” dealing with the Best Western hotel chain: An international criminal …

Don't miss

Cybersecurity news