Most believe free Wi-Fi can lead to identity theft
A new study by the Identity Theft Resource Center (ITRC) and PRIVATE WiFi, revealed that 79% of respondents believe that using a free Wi-Fi connection can lead to identity …
IBM releases ten integrated security solutions
IBM announced a broad set of security software to help holistically secure data and identities. IBM’s new software capabilities help clients better maintain security …
Secure64 updates its DNS management software
Secure64 released a new version of its DNS Manager product, which helps communication service providers (CSPs) configure, manage and monitor all of their Secure64 DNS servers …
Phishing attacks increasingly target brands
The number of brands targeted by phishing attacks sustained an all-time high of 428 in April of this year, the second record-breaking quarter for cybercrime brand abuse …
Thales releases elliptic curve hardware security modules
Thales introduced of nShield Connect 6000+ and nShield Solo 6000+ hardware security modules (HSMs), delivering the fastest available support for elliptic curve cryptography …
Mandiant unveils cloud-based network monitoring service
Mandiant announced Mandiant Cloud Alert, a subscription-based service which requires no hardware or software installation. It helps organizations pinpoint compromise in their …
Cisco and Citrix partner on networking and cloud
Cisco and Citrix announced an expansion of their desktop virtualization partnership into three strategic areas: cloud networking, cloud orchestration, and mobile workstyles. …
Facebook partners with Panda Security
Panda Security signed a collaboration agreement with Facebook to protect users. Facebook users will be able to download a free 6-month version of Panda Internet Security 2013 …
Time to rethink network management
The acceleration in data speeds and volumes in telecom networks is increasing the need for real-time network management solutions, according to Napatech. Network probes have …
BYOD security and control fears
Enterprises are restricting employee access to vital work applications due to security and control fears, according to Ping Identity. Employees were found to use an average of …
Cloud security application uses electronic fingerprint
Intrinsic-ID launched Saturnus, an application that allows users to protect data with their mobile devices before sending it to the cloud. It is the first application that …
Oracle patches 109 vulnerabilities
Oracle’s Critical Patch Update for October 2012 patches 109 vulnerabilities across hundreds of Oracle products. There are several patches that require immediate …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it