Please turn on your JavaScript for this page to function normally.
Bringing networking and security together through network automation

The past ten years have seen a proliferation of increasingly complex network devices. Coupled with the recent rise in adoption of BYOD policies, mobile working practices, …

Is network monitoring dead?

Network monitoring is dead, says the CEO of cPacket Networks; that is, unless network monitoring solutions become agile enough to deliver real-time visibility, while keeping …

Hosted virtual desktops can increase security

One of the most commonly cited motivations for implementing hosted virtual desktops (HVDs) is to increase the security of end-user computing, according to Gartner. Properly …

SafeNet releases first crypto hypervisor

At a time when confidence in perimeter security is waning, and organizations are increasingly facing business pressure to adopt cloud strategies and consolidate their data …

AlienVault releases USM virtual appliance

AlienVault released its AlienVault Unified Security Management (USM) virtual appliance, a collection of open source tools for asset discovery, vulnerability assessment, threat …

Rackspace launches Mobile Cloud Stacks

Rackspace released its new mobile cloud stacks for developers. These stacks are purpose built to help developers design, build, test, deploy and scale mobile apps in the …

Malware analysis for Virtual Desktop Infrastructures

HBGary unveiled Active Defense 1.3 to provide live, runtime memory analysis of concurrent Guest OS sessions with minimal impact on the shared physical resources of the …

The cloud: Storms on the horizon

At its heart, the cloud is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of your IT woes. But, beyond the marketing pitches …

Complex malware and BYOD drive mobile security

Mobile malware has advanced to a new level of sophistication as smart devices continue to gain ground. The number of unique mobile threats grew by 261% in just two quarters. …

Becoming a malware analyst

There are few jobs in this industry that seem as appealing and interesting to me as that of a malware analyst. In my mind, these professionals were waking up each day to …

Multi-layered authentication appliance from HID Global

HID Global announced its new ActivID Appliance solution for strong authentication at RSA Conference 2013. Enabling organizations to protect corporate data against unauthorized …

FireEye delivers threat protection platform

At RSA Conference 2013, FireEye announced its threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many …

Don't miss

Cybersecurity news