Please turn on your JavaScript for this page to function normally.
Forensics for advanced threat activity

Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices …

Security threats to expand in 2012

Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their …

Oracle Solaris 11: The first cloud OS

Oracle today released Solaris 11, the first Cloud OS. Oracle Solaris 11 is designed to meet the security, performance and scalability requirements of cloud-based deployments …

Hardware-based enterprise key management platform

Escalating threats, expanding regulatory requirements, and the movement to cloud-based and virtualized infrastructures are driving the need for a more unified approach to …

New cloud computing credential

CompTIA and ITpreneurs are collaborating on a new cloud computing skills credential. The Cloud Essentials exam, scheduled for availability in December 2011, will validate …

Secure access to Office 365 cloud-based web applications

RSA SecurID can now be integrated with the Windows Active Directory Federation Services 2.0 (AD FS 2.0). This integration can enable organizations to provide secure user …

McAfee updates its Cloud Security Platform

McAfee announced the latest enhancements to its Cloud Security Platform which secures all primary channels of traffic – email, web and authentication – moving …

GFI Software cloud-based anti-malware and anti-spam email security

GFI Software announced that GFI MailEssentials Complete Online, a cloud-based anti-malware and anti-spam email security solution, is now available to small and medium …

Focusing on new technologies instead of security threats

In the rush to utilize new technologies and move into the increasingly borderless world of cloud computing, mobile devices and social media, a growing gap is developing …

Managing firewall risks in the cloud

67 percent of IT security respondents in a Ponemon Institute study, report that their organization is very vulnerable or vulnerable because cloud ports and firewalls are not …

How organizations manage cloud computing security risks

A Ponemon Institut survey of 1,000 IT security practitioners and enterprise compliance officers revealed that less than half of all respondents believe their organizations …

Security concerns limit cloud computing use in law firms

Law firm technology managers are tempering their interest in cloud computing with a heightened focus on security, according to an annual survey published in The American …

Don't miss

Cybersecurity news