Please turn on your JavaScript for this page to function normally.
Cloud adoption generates security issues

Globally, the cloud continues to pose challenges on how to deliver agile, yet secure, IT services to enterprises. The percentage of companies that reported a data security …

Identifying and mitigating risk in virtual environments

Accuvant announced its FIDELITYv framework for identifying and mitigating risk in virtual environments which helps organizations realize more secure and agile IT models with …

The Official Ubuntu Book, 7th Edition

Ubuntu is a complete, free operating system that emphasizes ease of use, community, and support while enhancing speed, power, and flexibility. It is designed for everyone from …

Hackers allegedly breached Saudi Aramco again

Saudi Aramco, the national oil company of Saudi Arabia and the biggest oil company in the world, has issued a statement announcing that it has restored all its main internal …

Splunk delivers operational intelligence for the cloud

Splunk announced Splunk Storm, a cloud service based on the Splunk software and is for organizations that develop and run applications in the public cloud, using services such …

Fake Facebook photo notifications carry malware

Fake Facebook notifications informing users that a friend has posted a new photo of them on the social network have been spotted hitting inboxes around the world. The emails …

Trend Micro Deep Security 9 released

Trend Micro announced Deep Security 9, a server security platform designed to provide server, application and data security across physical, virtual and cloud environments …

Map of state data breach notification laws

Current state data breach notification laws are strikingly similar but vary in compliance requirements for businesses, with all laws highlighting the need for companies to …

Safeguard Facebook photos with McAfee Social Protection

McAfee announced the availability of a free public beta of McAfee Social Protection, a new app for Facebook that protects users’ photos from being shared without their …

BYOD is not for every company, or every employee

The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …

What keeps information security leaders awake at night

In this interview, Herbert ‘Hugh’ Thompson, Program Committee Chair for RSA Conferences and Chief Security Strategist at People Security, talks about challenges …

iAlertTag wirelessly secures, alerts, and locates your iPhone

Cirago International released its new iAlertTag (IAT1000), a solution for finding a lost iPhone, keeping an iPhone close by or locking your Windows laptop. iAlertTag creates a …

Don't miss

Cybersecurity news