TeamMentor: Secure software development knowledge base
Security Innovation released TeamMentor 3.2, a SaaS product that provides guidance to help security and development teams create secure software out of the box, along with …
LANDesk delivers secure user management suite
LANDesk Software announced LANDesk Secure User Management Suite, a solution aimed at helping IT professionals gain control of a mixed environment of users, devices and …
Cloud Security Alliance guidance for data ownership
The Cloud Security Alliance has incorporated in recently-released implementation guidance issued by the Security as a Service Working Group a set of recommendations for cloud …
Windows 8 Bible
Windows 8 is a new version of Microsoft’s flagship operating system and it’s packed with exciting new features. From the new Windows lock screen and the new …
Researchers deliver fix for Java 0-day to Oracle
Polish firm Security Explorations and its CEO Adam Gowdiak continue to be the a thorn in Oracle’s side by repeatedly questioning the giant’s decision not to issue …
Two analytics companies to settle charges for online user tracking
A web analytics company has agreed to settle Federal Trade Commission charges that it violated federal law by using its web-tracking software that collected personal data …
Malvertising on Yahoo Messenger hijacks browsers’ start page
Yahoo Messenger users who had the misfortune to follow the link in an advert for Vietnamese Internet directory website LaBan.vn and download the offered executable have been …
Rackspace launches Cloud Block Storage, powered by OpenStack
Rackspace announced Cloud Block Storage, powered by OpenStack. This solution provides an approach to attached storage in the cloud by addressing customer demand for …
Microsoft legalizes collection of user info from its free services
In a move that has not been noted by the great majority of Microsoft users, the Redmond giant has changed its Services Agreement on Friday in order to legalize the collection …
Top five tips for network protection
This year has seen a continued rise in targeted attacks and insider threats designed to steal confidential data. Nowadays, any organization that houses valuable intellectual …
Free dual-engine malware scanner
The free Emsisoft Emergency Kit 3.0 can detect and remove malware by simply starting it directly from a USB stick or CD without the need for installation. The kit comes with a …
Big data creates big jobs: 4.4 million IT jobs by 2015
Worldwide IT spending is forecast to surpass $3.7 trillion in 2013, a 3.8 percent increase from 2012 projected spending of $3.6 trillion, but it’s the outlook for big …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits