Reflecting on 2012: Cyberwar, next generation firewalls and compliance
Historically security products have been developed either in response to, or in anticipation of, major shifts in enterprise computing – or at least that’s been my …
Motives behind IT budget spend and 2013 cloud trends
A global survey of 550 CIOs, IT Directors, and senior IT managers has confirmed motives behind their IT budget spend in 2012, while revealing the rate of cloud adoption in …
Wi-Fi operating system ArrayOS gets new features
Wick Hill announced a new release of the ArrayOS operating system for Xirrus Wireless Arrays. Xirrus AOS 6.3 provides an advanced Wi-Fi operating system for optimizing the …
DataMotion unveils SecureMail Gateway
DataMotion announced updated its SecureMail Gateway, an intelligent monitoring solution that uses policy-based encryption and Exact Matching functionality to prevent data …
Damballa updates its cyber threat solution
Damballa unveiled Damballa Failsafe 5.1, a cyber threat solution for corporate networks. It includes features that reduce the workload of over-tasked incident response teams, …
Week in review: Inadequate AV solutions, Eurograbber attacks, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Security experts debate moving critical infrastructure online Paul Simmonds, …
Metasploit Pro 4.5 released
Rapid7 released a new version of Metasploit Pro, which introduces advanced capabilities to simulate social engineering attacks. With Metasploit 4.5, security professionals can …
U.K. hacker convicted for taking part in Anonymous attacks
22-year-old Christopher Weatherhead from Northampton, U.K., has been convicted on Thursday on one count of conspiracy to impair the operation of computers for his involvement …
Beware of bogus Facebook account cancellation requests
Bogus “Facebook Account Cancellation Request” emails are back, and this time the malicious senders didn’t opt for making users infect themselves. The …
Malicious email simultaneously impersonates UPS and FedEx
Malicious notifications supposedly coming from major courier delivery services companies are nothing new, but they still must catch enough users off guard. This latest one is …
Microsoft to release five critical bulletins
Microsoft Security Bulletin Advance Notification for December 2012 contains seven bulletins; five critical and two important. Bulletin 1 adversely affects Internet Explorer 9 …
Cloud-based services revenue to increase
Cloud-based services revenue in two years is expected to comprise nearly twice its current share of provider revenue, even as providers believe that showing evidence of cost …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits