Eliminating malware resident on file shares
FireEye announced its File Malware Protection System (MPS) that detects and eliminates advanced malware found on file shares. The solution prevents the lateral spread of …
0-day risk analysis service by Qualys
Qualys launched Zero-Day Risk Analyzer, a new service to help companies protect their IT systems against zero-day attacks which is delivered as part of the QualysGuard Cloud …
Software sensor for wireless intrusion detection
Fluke Networks today announced a new version of its WLAN security and performance monitoring solution, AirMagnet Enterprise, Version 10, which offers the industry’s …
The true state of cloud security
Alert Logic released its first State of Cloud Security Report, a semi-annual quantitative analysis comparing real world security incidents observed in hosted and cloud …
Eradicating malware from enterprise web sites
Qualys announced a new service to help enterprises detect and eradicate malware from their web sites. Delivered as part of the QualysGuard Cloud Platform and suite of …
Software patching made easy
PC users will be able to keep their software more secure with the launch of the latest version of the Secunia Personal Software Inspector (PSI). The Secunia PSI is a free …
RSA Conference 2012 opens in San Francisco
The world’s top information security professionals and business leaders gathered for the opening of the annual RSA Conference being held at San Francisco’s Moscone …
CSA launches mobile and innovation initiatives
The Cloud Security Alliance announced two significant new initiatives for 2012, addressing growing areas of need in cloud security – mobile computing and innovation. …
Transformable security engine from Stonesoft
Stonesoft introduced the Stonesoft Security Engine, a transformable security engine that is capable of delivering seven enterprise-class product configuration modes to provide …
Design guidelines for mobile app privacy
The GSM Association (GSMA), with the support of mobile operators in Europe and following consultation across the wider mobile ecosystem, has published a set of global Privacy …
WikiLeaks publishes Stratfor emails stolen by Anonymous
WikiLeaks has begun publishing internal emails exfiltrated from the systems of strategic intelligence company Stratfor and has teamed up with 25 media organizations who will …
Compromised websites from a site owner’s perspective
Malicious actors are often able to compromise legitimate websites without the site owners’ knowledge: over 90% of respondents didn’t notice any strange activity, …
Featured news
Resources
Don't miss
- Prioritizing data and identity security in 2025
- eBook: What does it take to be a full-fledged virtual CISO?
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk