Infosecurity Europe 2015, expo floor, part two
Infosecurity Europe 2015 is underway in London, and infosec companies, experts and customers are crowding the expo floor. For up-to-date conference news check out our …
IoT devices entering enterprises, opening company networks to attacks
OpenDNS released The 2015 Internet of Things in the Enterprise Report, a worldwide data-driven security assessment of Internet of Things (IoT) devices and infrastructure found …
Cloud SaaS data protection strategies
Handing control of sensitive data to a third-party cloud service provider remains one of the biggest data compliance challenges today. Top executives from Perspecsys are on …
Infosecurity Europe 2015, expo floor
Infosecurity Europe 2015 is underway in London, and infosec companies, experts and customers are crowding the expo floor. For up-to-date conference news check out our …
3-in-1 solution for enterprise management of privileged accounts and info
At Infosecurity Europe 2015, ManageEngine announced the Enterprise Edition of Password Manager Pro, its privileged access management software. Designed for large enterprises, …
Bug hunting without much tech knowledge or many tools
Bas Venis has been programming since he was 14 years old. After gaining some experience as a web developer, this 18-year-old self-taught security researcher got into IT …
Akamai and Trustwave unite to protect businesses from online threats
Akamai Technologies, provider of content delivery network services, and managed security services firm Trustwave announced at Infosecurity Europe 2015 a new strategic alliance …
Employee credentials of half of European top 500 firms exposed online
Cyber attacks and data breaches very often start with phishing or spear-phishing. Access to good credentials is key – whether it’s for straight emailing or direct …
Google releases new hub for managing security and privacy settings
Google has released a new privacy tool for users: the My Account centralized hub for managing Google Settings.“Privacy and security are two sides of the same coin: if …
The look and feel of Infosecurity Europe 2015
Infosecurity Europe 2015 is underway in London, and infosec companies, experts and customers are crowding the expo floor. Here’s the first of several galleries …
Enhanced security for corporate information on mobile devices
Enterprise organizations are continually looking for ways to effectively secure sensitive corporate information on mobile devices. At Infosecurity Europe 2015, TITUS announces …
Future attacks: Hiding exploit code in images
Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one – and run it? Saumil Shah, founder and CEO of Net-Square, …
Featured news
Resources
Don't miss
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)
- Cybercriminals are scaling phishing attacks with ready-made kits
- StackRox: Open-source Kubernetes security platform
- What happens to insider risk when AI becomes a coworker