Please turn on your JavaScript for this page to function normally.
Panic! No malware required!

The landscape has shifted. Security is no longer something your organization can have complete control over. In this video, John Strand will demonstrate how most large …

New Linksys dual-band Wireless-AC Access Points released

Linksys expanded its business networking line-up with two new 802.11ac access points which allow network administrators, resellers and businesses to deploy a high-speed …

CIOs are moving more information into the cloud

Despite continued concerns about security, CIOs and other senior-level IT leaders are moving an increasing percentage of their organizational information into the cloud and …

Tips for improving your cyber security

With cyber threats around the globe evolving and becoming more sophisticated, evidenced by the recent data breach at retailer Target, it is important that consumers protect …

European Cybercrime Centre warns about Windows XP security risks

The European Cybercrime Centre (EC3) at Europol warns about security risks related to the end of Windows XP support. After 8 April 2014, Windows will stop supporting its …

Cost of Advanced Evasion Techniques in recent data breaches

A new report by McAfee examines the controversy and confusion surrounding Advanced Evasion Techniques (AETs), and the role that they play in Advanced Persistent Threats …

Simple steps to prevent data theft

HID Global offered four tips for protecting organizations against the types of data breaches that recently occurred at major retailers. An effective defense against the …

Week in review: Banks sue Target and Trustwave, Basecamp DDoS, Fyodor restarts the Full Disclosure list

Here’s an overview of some of last week’s most interesting news, reviews and articles: Flaws in Android update mechanism could turn apps into malware A group of …

Having a backup solution doesn’t prevent data loss

Results from a survey of customers who lost valuable computer data shows the majority of consumers and businesses are taking steps to back up their data, but a range of minor …

Challenges of running cloud-hosted applications

CloudEndure revealed the results of an industry-first benchmark survey, presenting best practices and success metrics reported by companies that host web applications in the …

Analysis of three billion attacks reveals SQL injections cost $196,000

NTT Innovation Institute has announced the release of its Global Threat Intelligence Report (GTIR), which raises awareness with C-level executives and security professionals …

Does business understand IT security?

The role of IT security is still not well-understood by business, according to a new survey by Turnkey Consulting. The survey asked IT professionals about their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools