Rackspace Cloud APIs now open source
Rackspace has open sourced the specifications for its Cloud Servers and Cloud Files APIs under the Creative Commons 3.0 Attribution license. Developers are now free to copy, …
Admin gets prison time for hacking former employer’s network
The former director of information technology for a non-profit organ and tissue donation center was sentenced to two years in prison for hacking into her former …
Sourcefire and Qualys deliver real-time risk analysis
Sourcefire and Qualys announced that Sourcefire has become a Qualys Solution Partner and the companies have integrated the Sourcefire 3D System with QualysGuard. The …
RSA SecurID software token for iPhone
RSA released the RSA SecurID Software Token for iPhone Devices that enables an iPhone to be used as an RSA SecurID authenticator, providing convenient and cost-effective …
Social networking sites must improve security
Sophos has called upon social networking websites such as Twitter and Facebook to do more to protect their millions of users, as new research is published examining the first …
ISACA leader calls for changes to information security
At ISACA’s International Conference in Los Angeles this morning, security professional John Pironti called for a sweeping change in how enterprises deal with information …
Microsoft releases Threat Analysis and Modeling 3.0 beta
The Microsoft Threat Analysis and Modeling (TAM) tool allows non-security subject matter experts to enter already known information including business requirements and …
Protegrity unveils new version of data protection platform
Protegrity released the Protegrity Data Protection System (DPS) 5. It enables enterprises to select, deploy and easily manage a unified set of technologies that best meet …
Take action against the increase in SQL injection attacks
A steady increase in the number of SQL injection attacks means that companies should review their applications for vulnerabilities, and ensure vulnerabilities are patched. …
Splunk 4 supercharges IT search
Splunk announced Splunk 4 which improves an organization’s ability to manage, secure and audit their entire IT infrastructure. Re-architected and supercharged, Splunk 4 …
Spam reaches new record high
Marshal8e6 TRACElabs reported in their mid-year security report last week that spam volumes were up 60% from the start of 2009 until the end of June. Since the beginning of …
Proper backup procedures can save you in case of a disaster
Natural disasters such as earthquakes, hurricanes, tornados, fires and flooding can cause extreme damage to homes and businesses in affected areas. While physical damage to …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption