Active response to database threats
AppSecInc announced DbProtect Active Response. Designed to provide an added layer of security around valuable and sensitive data, it gives organizations the flexibility to …
Improve payment security in-line with PCI DSS
NNT launched version 5 of its Change Tracker and Log Tracker Enterprise software suite. The software is specifically designed to improve payment security and protect against …
Risk I/O partners with Qualys SaaS platform
Risk I/O announced its partnership with Qualys. Under the partnership, the companies will integrate Risk I/O with QualysGuard, enabling users to easily detect and manage …
Digital Triage Forensics
Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield …
What threats can we expect in October?
Fraudulent online storefront promising cheap HP Touchpads, poisoned search engine results targeting users searching on Yahoo and Bing, and spam promising a US green card have …
How to conduct an internal audit according to ISO 27001 and BS 25999-2
The key purpose of an internal audit is for an organization to find out if all the processes and activities are running as they are expected. An nternal audit is usually …
WineHQ database breached; Fedora Project forces password change
Following last month’s compromises of the primary repository for the Linux kernel source code and the websites and infrastructure of the Linux Foundation comes the news …
Data security for businesses that don’t need a full security suite
Protecting sensitive data is an irreplaceable part of computer security. Useful tools for data encryption and shredding belong to the standard gear of TrustPort Total …
Trojanized Netflix app steals account login credentials
When Netflix released an Android client app earlier this year, it also witnessed the attempts of various app developers who tried to make a pirated copy of it work on other …
Security pros say that hackers have the upper hand
The numbers don’t lie: now, more than ever, security professionals feel outgunned by attackers and the level of automation employed in most campaigns against enterprise …
Cyber threat defense, detection and response platform
LogRhythm announced LogRhythm 6.0, an evolution to its SIEM 2.0 security intelligence platform with significant innovations in cyber threat defense, detection and response. …
Website reputation and automatic blacklisting enhance GFI WebMonitor
GFI announced that GFI WebMonitor now includes new security and anti-malware features that enable small and medium-sized businesses to provide employee Internet access without …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days