Please turn on your JavaScript for this page to function normally.
NIST updates ICS security guide

The National Institute of Standards and Technology (NIST) has issued the second revision to its Guide to Industrial Control Systems (ICS) Security. It includes new guidance on …

Released: New version of REMnux Linux distro for malware analysis

REMnux is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident …

Week in review: Hiding exploit code in images, online summer travel scams, and Infosecurity Europe 2015

Here’s an overview of some of last week’s most interesting news and articles:Cookie warnings: Useless and bad for security?Our daily clicking away of these …

Stagnant budgets and rising insider security threats

A Vectra Networks survey of more than 500 cybersecurity professionals in the Information Security Community on LinkedIn reveals that insider threats are rising, but IT …

Online summer travel scams to watch out for

Iovation released a list of common online summer travel scams to watch out for. The company also announced that it has seen a hundred percent increase in online travel …

70% of breaches are detected by a third-party

46 percent of organizations that have suffered a data breach took more than four months to detect a problem, and more than three months to mitigate the risk. Worryingly, the …

CSA releases tool for personal data legal protection

At Infosecurity Europe 2015, the Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group released the Privacy Level Agreement (PLA) v2, a tool that provides …

Access control and password management solution for privileged endpoints

Bomgar and Thycotic have partnered to provide enterprises with better control and visibility of access to critical endpoints and privileged accounts.Bomgar Privileged Access …

Ipswitch offers secure managed file transfer analytics and reporting

At Infosecurity Europe 2015 Ipswitch File Transfer announced the release of Ipswitch Analytics, a new reporting and monitoring solution for MOVEit Secure Managed File …

Risk managers most worried about loss of information confidentiality

Almost 70 percent of businesses experienced at least one hacking incident in the last year, according to a study of business risk managers released today by The Hartford Steam …

Cloud-based solutions that protect against zero day attacks

BAE Systems Applied Intelligence announced at Infosecurity Europe 2015 that it is bringing cloud-based cyber security to commercial organisations in Europe for the first time. …

Shadow IT is prevalent in government agencies

Despite clear benefits of cloud services – greater collaboration, agility, and cost savings – federal agencies are slow to migrate to the cloud due to security concerns. As a …

Don't miss

Cybersecurity news