Please turn on your JavaScript for this page to function normally.
Fox-IT launches cyberthreat management platform

Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide …

Binary
Security guidance for early IoT adopters

The Internet of Things (IoT) provides new and enhanced capabilities across diverse industries and enterprise functions, as well as unique security challenges associated with …

Red door
Real-time traffic analysis and inventory of virtualized assets

Catbird Insight, a visualization solution for cloud and on-premise virtual environments that helps organizations rapidly discover, organize and analyze their virtual fabric to …

Russian APT group actively exploiting Flash, Windows 0-day flaws

APT28, believed to consist of Russian hackers, has been spotted wielding two zero-day exploits in the latest targeted attack aimed at an “international government entity …

shadow
Organizations continue to rely on outdated technologies

TechValidate conducted a survey to determine how organizations are implementing NAC policies and security solutions to address today’s environments, given the …

Cloud
Radware launches hybrid cloud based WAF service

Cyber attacks remain a persistent threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web attack vectors, …

Five misunderstandings about cloud storage

Cloud storage is a solution that users are driving IT organizations to use whether we want to or not. Just ask a sales person what they use. They will tell you how great it is …

binary
BlackVault CYNR: Code and document signing appliance

Engage Black introduced the BlackVault CYNR security appliance at RSA Conference 2015. The BlackVault CYNR integrates a Layer 3+ Hardware Security Module (HSM) with …

becrypt tvolution
The portable secure desktop: tVolution Mini

At the RSA Conference 2015 Becrypt launched tVolution Mini. The device is smaller than a mobile phone, but has the power of a PC, and transforms a monitor or TV into a smart …

Week in review: APT wars, 18-year-old bug endangers Windows users, and main sources of data breaches

Here’s an overview of some of last week’s most interesting news and articles:Simda botnet taken down in global operationThe Simda botnet, believed to have infected …

How IT pros protect and investigate their endpoints

More organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute. …

1 in 4 employees enable cloud attacks

While businesses are clearly embracing the power of cloud applications with each organization collaborating with an average of 865 other organizations – internal users, …

Don't miss

Cybersecurity news