ManageEngine fortifies enterprise security log analytics
ManageEngine announced the general availability of new features to its enterprise security log analytics portfolio. EventLog Analyzer, the security information and event …
IT sec pros surprisingly cavalier about mobile security best practices
A flash poll conducted at Infosecurity Europe 2014 by Centrify Corporation has found that 94 per cent of IT security professionals use third party applications on their mobile …
IoT security requirements will reshape enterprise IT security programs
The power of objects in the Internet of Things (IoT) to change the state of environments — in addition to generating information — will cause chief information security …
CSA releases Software Defined Perimeter 1.0
The Cloud Security Alliance (CSA) announced at Infosecurity Europe 2014 the release of two key documents related to the CSA’s Software Defined Perimeter (SDP), an …
London warbiking reveals worrying state of Wi-Fi security
At Infosecurity Europe 2014, IT security company Sophos this week highlighted the worrying state of wireless security in the UK’s capital city, when it sent security …
Security analytics solution identifies attacks in historic data
Arbor Networks is showcasing at Infosecurity Europe 2014 its Pravail Security Analytics, whose unique looping capability can be used to identify and establish an attack …
The devastating effect of core systems downtime on business
A survey of 283 IT professionals and business end users found that nearly 90 percent of organizations unexpectedly lose access to critical systems, including mail servers, …
Sophos Cloud manages Windows, Mac and mobile devices
At Infosecurity Europe 2014, Sophos announced the latest version of Sophos Cloud, the company’s cloud-based solution for small- and mid-sized organisations seeking a …
Infosecurity Europe 2014 expo floor, part four
For up-to-date conference news (and more photos) check out our dedicated coverage page for Infosecurity Europe 2014. Featured firms: Cisco/Sourcefire, Juniper Networks, …
Researcher says traffic control systems can be hacked
Hacking control systems that regulate traffic lights in United States’ big, gridlocked cities is not only possible in action films, but in reality as well, says Cesar …
The importance of visibility for today’s complex networks
The complexity of modern enterprise networks is increasing due to a number of factors, and deeper levels of network visibility are necessary to aid in their management and …
Target announces move to chip-and-PIN card technology
Target has announced that, effective May 5, Bob DeRodes will lead the company’s information technology transformation in the wake of the massive breach it recently …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)