software
Damballa now detects malicious P2P communications
Damballa Failsafe can now discover malicious P2P communications. It uses behavioral detection techniques to identify malicious P2P communication attempts from malware trying …
Solution for Active Directory-based single sign-on
Centrify announced Centrify for Office 365, a solution for Active Directory-based single sign-on, user provisioning and mobile management for Office 365. The Azure-based …
Security software market grew 7.9% in 2012
Worldwide security software revenue totaled $19.2 billion in 2012, a 7.9 percent increase from 2011 revenue of $17.7 billion, according to Gartner, Inc. Gartner said that the …
Employees continue to use risky apps on mobile devices
Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …
Parents should be concerned about app security
Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …
Apache server bug allows remote code execution
The existence of a “moderately critical” Apache HTTP Server vulnerability whose exploitation could allow attackers to compromise the system and execute arbitrary …
Migration and monitoring of Microsoft environments
Dell Software announced a series of new enhancements designed to help organizations optimize the migration, management and monitoring of Microsoft environments. Dell Software …
McAfee unveils Complete Endpoint Protection suites
McAfee introduced two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. The suites include McAfee …
Scanner identifies malware strains, could be future of AV
When it comes to spotting malware, signature-based detection, heuristics and cloud-based recognition and information sharing used by many antivirus solutions today work well …
Killer apps: The performance of networked applications
Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …
Logging and Log Management
Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …
Free tool repairs critical Windows configuration vulnerabilities
Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks