Please turn on your JavaScript for this page to function normally.
Watchful Software updates its information protection solution

Watchful Software released RightsWATCH 5.0, which extends the secure flow of information throughout an organization while automatically applying corporate security policies …

US government security background checks fumbled by investigators

Edward Snowden’s successful exfiltration of confidential NSA documents has proved that the background checks executed for government personnel in order to receive the …

Amateur hacker behind DDoS attack on China?

When, in late August, China’s Domain Name Service was targeted by a huge DDoS attack which ultimately lead to many websites being completely inaccessible for a period of …

Industry leaders perceive numerous security threats to their data

An overwhelming majority of business leaders believe their customers and clients worry about breaches of personal data held by their organizations. Unisys-sponsored research …

Organizations fear their privacy activities are insufficient

The perceived level of maturity attached to organizations’ privacy activities has decreased since 2011, as many organizations deem their existing privacy activities to …

Organizations are flying blind as they embrace cloud services

Organizations lack the information to understand and mitigate a broader set of risks posed by the use of cloud services, according to Skyhigh Networks. “What we are …

Icefog cyber espionage campaign exposed

Kaspersky Lab’s security research team discovered Icefog, a small yet energetic Advanced Persistent Threat (APT) group that focuses on targets in South Korea and Japan, …

Big data analytics for security intelligence

The Cloud Security Alliance (CSA) Big Data Working Group today announced the release of Big Data Analytics for Security Intelligence. The new research report details how the …

Amazon.com released Fire OS 3.0 “Mojito”

Amazon.com introduced Fire OS 3.0 “Mojito,” the next generation of software and services that powers Kindle Fire tablets, with hundreds of updates and new features …

Deploy endpoint encryption technologies with Wave Cloud 2014

Wave Systems launched Wave Cloud 2014, a cloud-based service for enterprise-wide management of endpoint encryption. It includes management of Windows BitLocker and Mac …

CORE Impact Pro 2013 R2 gets enhanced web services capabilities

CORE Security released CORE Impact Pro 2013 R2, that allows organizations to proactively test IT infrastructure and identify exactly where and how an organization’s …

Data broker databases breached, stolen info used by ID theft service

Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be …

Don't miss

Cybersecurity news