Tips to minimize the risk and impact of identity fraud
Last week, a Javelin Strategy & Research report found 12.6 million victims of identity fraud in the United States in the past year, which equates to 1 victim every 3 …
F-Secure launches one-stop, multi-device security
A one-stop-shop for multi-device security is here, answering to the growing need for converged security across multiple devices. F-Secure’s Safe Avenue allows consumers …
Avast 8 generates detection of entire malware families
At RSA Conference 2013 in San Francisco, Avast Software introduced a new version of its consumer security software line, with a number of new technologies and improvements to …
More (circumstantial) findings reinforce Mandiant’s APT1 claims
The release of Mandiant’s APT1 report has created quite a stir in security and international political circles. The majority saw it as a confirmation of the long held …
Endpoint manager with panoramic, touch screen display
At RSA Conference 2013 in San Francisco, Comodo announced their latest solution for centralized administration of security, including anti-virus protection of endpoints: …
Yubico launches smart card that combats spying malware
Yubico announced that the Yubikey NEO aggressively defends against malware aimed at smart cards. Successfully piloted by leading enterprises, the new product eliminates the …
Bank of America says leaked data did not come from their systems
Bank of America has confirmed that some of the data included in the massive leak by Anonymous-affiliated group “Par:AnoIA” does belong to them, but that it …
Juniper adds global attacker intelligence service to its products
At RSA Conference 2013, Juniper Networks unveiled its next-generation security products for protecting data center environments, fortified by the Junos Spotlight Secure global …
Co3 Systems delivers security incident response
Co3 Systems announced an expansion to its SaaS-based incident response platform. The new Security module provides automated, single-pane incident management in a secure, …
Security breaches remain undiscovered and unresolved for months
At RSA Conference 2013 in San Francisco, Solera Networks announced the results of the Ponemon Institute’s 2013 report, “The Post Breach Boom,” which revealed …
Test malware handling capabilities of network security devices
At RSA Conference 2013 in San Francisco, Spirent Communications announced the release of malware testing capabilities on Spirent Studio. With the addition of malware testing, …
3 out of 4 infosec pros unsure they would spot a breach
LogRhythm announced the results of its 2nd Annual Cyber Threat Readiness Survey of 150 IT security professionals on their organizations’ readiness to address advanced …
Featured news
Resources
Don't miss
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse
- Train smarter, respond faster: Close the skill gaps in your SOC