Please turn on your JavaScript for this page to function normally.
Qualys Continuous Monitoring
Product spotlight: Qualys Continuous Monitoring

Today’s cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an …

Why WinSCP became an open source classic

If you’re a Windows user and you’re connecting securely to remote machines, you’ve probably heard about WinSCP. This multi-functional open source tool has …

Product spotlight: Targeted threat intelligence from Solutionary

As IT security threats have become more targeted to specific industries, organizations and even individuals, the need has arisen for threat intelligence that is tailored for …

BalaBit updates Shell Control Box

BalaBit announced Shell Control Box (SCB) 4 F1, an enterprise-level activity monitoring appliance that controls privileged access to remote IT systems, records activities in …

Puzzle
Classification and protection of unstructured data

In this podcast recorded at RSA Conference 2015, Stephane Charbonneau, CTO of TITUS, talks about TITUS Classification Suite 4, a significant new release of its flagship data …

Lenovo makes new critical security mistakes

After the Superfish debacle earlier this year, Lenovo’s security practices have once again been found lacking as researchers have discovered several vulnerabilities in …

Netflix open sources FIDO, its automated incident response tool

Netflix has open sourced FIDO (Fully Integrated Defense Operation), a system for automatically analyzing security events and responding to security incidents that the company …

Company invokes DMCA to block researcher from disclosing flaws in its product

Electronic lock maker CyberLock has attempted to prevent IOActive from releasing information about a host of security flaws they discovered in its product of the same …

The importance of data loss prevention for OS X

Apple products have increasingly gained popularity in enterprise environments due to perception that they are so secure they will never get attacked and no data will be …

USBKill turns thumb drives into computer kill switches

A coder that goes by the online handle “Hephaestos” has shared with the world a Python script that, when put on an USB thumb drive, turns the device in an …

The enduring chasm between security teams and developers

The gap between application builders (developers and development organizations) and defenders (security and operations teams responsible for securing apps) is closing …

Researcher neutralizes Google’s Password Alert with a few lines of code

Google’s Password Alert extension for Chrome, which was released on Wednesday, has received its first critical security update less than 24 hours later, as infosec …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools