Please turn on your JavaScript for this page to function normally.
Real-time threat intelligence delivery

As the threat landscape is evolving on a daily basis, it is imperative that organizations and their IT security teams are aware of the latest vulnerability threats. Perimeter …

Canadian government networks breached by Chinese hackers?

When it comes to covert cyber attacks on government networks, it somehow seems that they can always be traced back to servers in China. It is always acknowledged that that …

Mobile security solution enforces policy in the cloud

Zscaler unveiled Zscaler Mobile, which adds a uniform way to secure the mobile experience for small to large organizations. The solution enforces policy in the cloud, not on …

Securing data centers from blended threats

Fortinet announced the addition of a new consolidated security appliance to its FortiGate product family, and a new release of its FortiOS 4.0 operating system for said …

Moderately critical MS Windows vulnerability revealed

Information about a critical Microsoft Windows SMB browser election request parsing vulnerability turned up two days ago on the Full Disclosure mailing list and further …

A Trojan-Clicker for Android spotted

A new Android Trojan – dubbed HongTouTou or ADRD – has been spotted targeting Chinese-speaking users. Repackaged with popular Android applications and games, it is …

Cloud encryption software for private cloud infrastructures

CREDANT announced the beta program for its cloud encryption software for virtual desktop infrastructure (VDI) private cloud infrastructures. With this launch, the company …

One in 10 IT pros have access to accounts from previous jobs

According to a survey that examines how IT professionals and employees view the use of policies and technologies to manage and protect users’ electronic identities, the …

Closing the privileged identity visibility gap

Security information and event management (SIEM) solutions have become a must-have in IT environments because the technology helps make sense of the vast quantities of data …

Cloud-based software reputation platform

Bit9 announces the first open, cloud-based reputation platform available to assess the trustworthiness of software. The Bit9 Global Software Registry (GSR) is now accessible …

Sun Java by far the most vulnerable plug-in

Wondering how secure your browser is? Today at the RSA Conference in San Francisco, Qualys CTO Wolfgang Kandek presented their research which clearly shows that browser …

Photos: RSA Conference 2011 Expo

The real action is on the expo floor. Plenty of hardware at the Stonesoft booth. Discussions were lively at the PhoneFactor booth. One of many high profile presentations at …

Don't miss

Cybersecurity news