New data security software from IBM
Today, organizations are struggling to manage a variety of complex data security threats, from misuse by insiders or cyber criminals outside the company. Combined with an …
HP to acquire ArcSight
HP and ArcSight have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of …
Browser protection against Web-borne threats
Invincea Browser Protection safeguards enterprise PCs against all types of web-borne threats by moving web browsers—the entry point for most malware—into a virtual …
Vulnerability assessment for databases
Sentrigo announced a fully integrated database activity monitoring and vulnerability assessment solution for enterprises. Hedgehog Enterprise 4.0 provides a complete database …
Week in review: Inside a CERT, hotel systems breach and DHS network security holes
Here’s an overview of some of last week’s most interesting news, articles and videos: Behind the scenes and inside workings of a CERT Brian Honan is the founder …
Dynamic worm wreaks havoc
A rather industrious worm has been detected by Trend Micro threat analysts, and it usually infects users who have been careless enough to click on a link offered in a variety …
Rogue employees sell passport data of World Cup fans
Reports are coming in that the Information Commissioner’s Office has started investigating FIFA, the world football governing body, over allegations that details of …
Incentives and challenges for cyber security information sharing
The European Network and Information Security Agency (ENISA), launched a new report on barriers to and incentives for cyber security information sharing. It shows that the …
Hotel systems breached and card info stolen all over the U.S.
The payment system at a number of properties of HEI Hospitality – the hospitality operator that runs over 30 upscale hotels across the U.S. under brand names as …
Be careful what you reveal online
In the video below, Trend Micro CTO Raimund Genes discusses how an attacker can use information from social networks such as LinkedIn and Facebook to hack into a corporate network.
Audit reveals gaping security holes on DHS networks
The recently released results of a security audit performed on the various systems used by the US-CERT to accomplish its cybersecurity mission revealed an unpleasant reality: …
PayPal fails to follow its own anti-phishing advice
PayPal credentials are one of the most sought after by phishers, so it stands to reason that the company would try to educate its users on Internet safety. And it does – …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)