Data security for Microsoft SharePoint
Imperva announced SecureSphere for SharePoint, a data security solution to help businesses protect sensitive data stored in Microsoft SharePoint. The product addresses the …
ISACA issues COBIT process assessment model
Since COBIT was issued 15 years ago, enterprises worldwide have been using it to assess and improve their IT processes. However, until now there has not been a consistent and …
ISO 27001 documentation toolkit
Documentation is the core of your ISO 27001 implementation. A good set of documents will enable your employees to understand their obligations better. Poorly written documents …
Apple to launch iCloud on October 12
Apple announced that iCloud, a set of free cloud services, will be available on October 12. iCloud stores your music, photos, apps, contacts, calendars, documents and more, …
IBM to acquire Q1 Labs
IBM announced a definitive agreement to acquire security intelligence software provider Q1 Labs. The move aims to accelerate IBM’s efforts to help clients more …
Anti-theft protection for Android and Windows devices
Norton Anti-Theft is a new Web-service that allows consumers to remotely lock, locate and recover a lost or stolen Windows based laptop, or Android smartphone or tablet. The …
McAfee to acquire NitroSecurity
McAfee announced a definitive agreement to acquire privately owned NitroSecurity, a provider of SIEM solutions that provide visibility and situational awareness. NitroSecurity …
Critical vulnerabilities in Adobe Photoshop Elements 8
Critical vulnerabilities exist in Adobe Photoshop Elements 8.0 and earlier versions. These two buffer overflow vulnerabilities (CVE-2011-2443) could cause a crash and …
FFmpeg multiple vulnerabilities
Multiple vulnerabilities have been reported in FFmpeg, which can be exploited by malicious people to cause a Denial of Service and potentially compromise a user’s …
Webroot SecureAnywhere integrates PC, Android and iOS security
Following Kaspersky One and McAfee All Access, Webroot announced centralized security management for PC, Android and iOS users. Webroot SecureAnywhere enables users to manage …
Suspect cyberbullying? Here’s five tips on what to do
Most parents know that when a bullying incident occurs with their child, they should address it immediately. In the case of cyberbullying, online tools are now available to …
Trend Micro Deep Security Parns Common Criteria EAL 4+ certification
Trend Micro announced that its advanced server and virtualization security solution, Deep Security achieved Common Criteria Evaluation Assurance Level 4 augmented (EAL 4+) …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated