Please turn on your JavaScript for this page to function normally.
Security software market grew 7.9% in 2012

Worldwide security software revenue totaled $19.2 billion in 2012, a 7.9 percent increase from 2011 revenue of $17.7 billion, according to Gartner, Inc. Gartner said that the …

Employees continue to use risky apps on mobile devices

Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …

Parents should be concerned about app security

Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …

Apache server bug allows remote code execution

The existence of a “moderately critical” Apache HTTP Server vulnerability whose exploitation could allow attackers to compromise the system and execute arbitrary …

Migration and monitoring of Microsoft environments

Dell Software announced a series of new enhancements designed to help organizations optimize the migration, management and monitoring of Microsoft environments. Dell Software …

McAfee unveils Complete Endpoint Protection suites

McAfee introduced two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. The suites include McAfee …

Scanner identifies malware strains, could be future of AV

When it comes to spotting malware, signature-based detection, heuristics and cloud-based recognition and information sharing used by many antivirus solutions today work well …

Killer apps: The performance of networked applications

Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …

Logging and Log Management

Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …

Free tool repairs critical Windows configuration vulnerabilities

Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and …

Find TrueCrypt and BitLocker encrypted containers and images

Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan. For a computer …

Sourcefire goes beyond the sandbox

Sourcefire introduced malware trajectory capabilities across its Advanced Malware Protection portfolio, giving customers visibility into malware attack activity and enabling …

Don't miss

Cybersecurity news