BYOD is not for every company, or every employee
The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …
What keeps information security leaders awake at night
In this interview, Herbert ‘Hugh’ Thompson, Program Committee Chair for RSA Conferences and Chief Security Strategist at People Security, talks about challenges …
iAlertTag wirelessly secures, alerts, and locates your iPhone
Cirago International released its new iAlertTag (IAT1000), a solution for finding a lost iPhone, keeping an iPhone close by or locking your Windows laptop. iAlertTag creates a …
Intel partners with VMware for cloud security
Although companies are expanding their use of cloud computing to realize improved agility and efficiencies, concerns about security remains a top barrier to adoption. Intel …
Hackers leak information stolen from over 100 sites
Hacker collective Team GhostShell has posted on Saturday on their Twitter account links to a massive leak that supposedly includes over one million of user record sets stolen …
Critical Java 0-day flaw exploited in the wild
Researchers from security firm FireEye have discovered targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting …
Kingston unveils new enterprise-class SSD
Kingston Digital announced the SSDNow E100 SSD, a new SSD which enables enterprises to accommodate the performance demands required in support of big data and virtualization …
Mikko Hypponen: Where are we and where are we going
Mikko Hypponen is the Chief Research Officer at F-Secure. Here you can watch his keynote at this year’s Hack In Paris conference.
Dropbox introduces 2-factor authentication
Early this month, popular file hosting service Dropbox confirmed an internal breach the resulted in its European users receiving spam advertising gambling websites, and …
Data protection for the cloud with ProtectV
As more data moves to private or public clouds, the number of super-users with access to an organization’s data multiplies, the risk of VMs being copied without the …
“Tax Payment Rejected” spam campaign
Bogus emails supposedly coming from the US Internal Revenue Service (IRS), informing users that their “tax transaction” has been cancelled and trying to get them …
Cyber incident reporting in the EU
ENISA took a snapshot of existing and future EU legislation on security measures and incident reporting. Their analysis underlines important steps forward, but also identifies …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it