Please turn on your JavaScript for this page to function normally.
Cisco unveils threat-focused next-generation firewall

Cisco introduced a threat-focused Next-Generation Firewall (NGFW). Cisco ASA with FirePOWER Services provides the full contextual awareness and dynamic controls needed to …

(IN)SECURE Magazine issue 43 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 43 has been released today. Table of contents: …

System failures cause most large outages of communications services

The European Union Agency for Network and Information Security (ENISA) published a report about large-scale outages in the electronic communication sector. It provides an …

Dragonfly malware targeting pharmaceutical companies

The recently revealed Dragonfly (Havex) malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed, according to Belden. Until now, …

Emerging cloud threats and how to address them

As organizations deploy and harness private, community and hybrid clouds, they encounter new types of threats, along with the old ones they’ve been battling for years. …

Video: Reactions of engineers under GCHQ surveillance

Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for …

Best practices for skimming prevention

The PCI Security Standards Council released an update to its guidance for merchants on protecting against card skimming attacks in POS environments. Card skimming continues to …

75% of mobile apps will fail basic security tests

Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner. Enterprise employees download from app stores and use mobile …

Week in review: Security experts discuss Apple Pay, Salesforce hit with targeted attack

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Mobile forensics in a connected world In this interview, Andrew …

Securing virtual machines: Considerations for the hybrid cloud

With enterprises’ growing interest in adopting the hybrid cloud, Cloud Service Providers (CSPs) want to develop premium cloud offerings that fuel the rate of this …

Everything you need to know about POS malware

With this year’s dramatic uptick in data breaches targeting retailers and restaurant chains and, more specifically, the payment card data they process every day, …

Internet of Things to make CISOs redefine security efforts

By year-end 2017, over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of …

Don't miss

Cybersecurity news