Retail sector slow in adopting new PCI standards
Tripwire announced the results of research on risk-based security management in the retail industry, and the news isn’t good: the majority of the retail sector is yet to …
NSA taps cables connecting Google and Yahoo data centers
The US NSA and its UK counterpart GCHQ have collaborated in tapping the overseas fiber-optic cables used by Google and Yahoo to exchange data stored in their many data centers …
Network IDS reduces “white noise” for more focus on critical vulns
RandomStorm has announced the latest release of its next generation network intrusion detection system (NIDS), StormProbe. StormProbe analyses all network traffic, using more …
Spike in suspicious traffic and TOR usage, says threat report
Solutionary has released its Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report for Q3 2013, providing intelligence on key security threats …
Solving network security complexity with automation
Network security has become too complex to manually manage, and companies should consider automation and orchestration in order to increase IT agility while maintaining …
Exposing unknown threats with mathematical science
Cylance announced today the official worldwide release of CylanceV, a new cloud and on-premise solution to find what others miss in detecting advanced malware. CylanceV …
Counterfeit money detector easily hacked to accept fake money
A lot of simple electronic devices that we use every day can be easily hacked, because security has for a long time been at the very bottom of the list of things to care about …
Sophos delivers cloud-based endpoint security
Sophos announced Sophos Cloud, an easy to use security service that provides essential protection for today’s advanced threats. This first version of Sophos Cloud …
Russia handed malware-laden devices to G20 delegates?
At the G20 summit held near St. Petersburg in September, attending delegates representing the 20 most powerful nations in the world have been handed gifts that included …
Microsoft details risks of running unsupported software
Microsoft published their Security Intelligence Report (SIR) volume 15, which analyzes threat intelligence from more than 1 billion systems worldwide to provide in-depth …
Obama orders NSA to stop spying on UN diplomats
There is nothing wrong with spying on foreign national leaders, even when they are allies, said NSA head General Keith Alexander and NI director James Clapper at a hearing …
Women crucial for taking infosec industry to next level
Women represent only 11 percent of the information security workforce yet they have the academic background and diverse perspective necessary to accelerate change in the …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade