Please turn on your JavaScript for this page to function normally.
On-demand cloud identity management

Ping Identity unveiled PingOne, a multiplexed identity switch in the cloud. One connection to PingOne provides businesses the convenience of Tier 1 Single Sign-On (SSO) access …

BS 25999-2: An overview of BCM implementation process

While many business continuity methodologies exist for more than 20 years, none of them have really managed to include business continuity in regular management duties – …

The practice of insecure collaboration

Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …

Intel partners with StorageCraft for backup

StorageCraft Intel and StorageCraft have partnered to offer a Backup & Recovery (BDR) appliance, operating on the Intel Hybrid Cloud platform. The appliance protects an …

Apple, Facebook and others named in privacy lawsuit

Thirteen individuals have filed a lawsuit against a number of app makers including Path, Facebook, Instagram, Yelp and Rovio, accusing them of uploading the information stored …

Unified web security solution from Blue Coat

Blue Coat Systems introduced its Unified Security solution that enables the extended enterprise to expand its secure perimeter to now include all users on devices across any …

US govt and military email addresses offered for sale

Cyber crooks are very well aware that information is a very lucrative commodity and that every type of information has potential buyers. Take email addresses, for example. …

Europeans targeted with new ransomware

In the last couple of years, malware that hijacks the users’ machines and demands money to “unblock” it has become an often encountered threat. Messages …

Fake LinkedIn emails serve malware

Emails purportedly coming from business-related social network LinkedIn have been hitting inboxes in the last couple of days, ostensibly reminding recipients of invitations …

Packet Guide to Routing and Switching

Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. …

Week in review: Multifunction printer hacking, new protection mechanisms for IE 10 and most notorious Android malware

Here’s an overview of some of last week’s most interesting news, podcasts, articles and reviews: Multifunction printer hacking In this podcast, Deral Heiland talks …

Working exploit for MS12-020 RDP flaw found

The vulnerability in Microsoft’s Remote Desktop Protocol (RDP) implementation (MS12-020) – a patch for which has been released by during the last Patch Tuesday …

Don't miss

Cybersecurity news