Please turn on your JavaScript for this page to function normally.
Detect and respond

At a recent security and risk management conference I had an opportunity to talk with industry analysts about today’s challenges in network security. It seems that many …

Critical 0-days found in CPE WAN Management Protocol

Check Point has released its findings of security concerns in CPE WAN Management Protocol (CWMP/TR-069) deployments, used by major ISPs globally to control business and …

Week in review: 1.2B Web credentials stolen, Google Search prioritizes HTTPS websites, and how to foil SynoLocker

Here’s an overview of some of last week’s most interesting news, articles and interviews: How secure are today’s critical networks? In this interview, Dr. …

Serious flaws in cell phone carrier control software found

At the Black Hat conference this week, two Accuvant researchers have disclosed serious security flaws in the carrier control software used in over 2 billion cellular devices …

End-to-end encryption hardware for unsecure networks

x.o.ware has debuted the ExoNetTM VPEx Gateway and its companion product, the ExoKey Secure Communications Extension, this week at Black Hat USA 2014. These two new products, …

Mocana offers an alternative to OpenSSL on Apache web servers

At the Black Hat USA 2014 conference, Mocana debuted its enterprise-grade NorthStar secure connectivity solution for Apache web servers, a highly secure, drop-in replacement …

Unified solution for dynamic mitigation of cyberattacks

At Black Hat USA 2014, ForeScout Technologies, provider of pervasive network security solutions for Global 2000 enterprises and government organizations, and ThreatStream, a …

Five steps to take to protect your passwords

A report issued this week claimed that a Russian cybercrime group stole 1.2 billion usernames and passwords from 420,000 websites. While some security experts question the …

Gemalto to acquire SafeNet

Gemalto has signed a definitive agreement to acquire 100% of the share capital of SafeNet, a worldwide leader in data protection and software monetization, from Vector Capital …

Oracle introduces vault for encryption keys, wallet files

Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as …

Photo gallery: A walk through Black Hat’s Business Hall

This gallery from Black Hat features: Qualys, Blue Coat Systems, FireEye, Shape Security, Michael Schrenk, Gigamon, Securonix, ThreatTrack Security.

Free Android app identifies and uninstalls spyware

At Black Hat, SnoopWall announced the release of Privacy App for Android platform mobile devices. Privacy App is based upon the company’s counterveillance technology. It …

Don't miss

Cybersecurity news