Please turn on your JavaScript for this page to function normally.
The threat within: How SMEs can protect themselves from light-fingered staff

It hasn’t been an easy time for small businesses. Where once cybercriminals shunned SMEs in favour of larger corporates, the threat landscape has changed drastically in …

Exposing unknown threats with mathematical science

Cylance announced today the official worldwide release of CylanceV, a new cloud and on-premise solution to find what others miss in detecting advanced malware. CylanceV …

Sophos delivers cloud-based endpoint security

Sophos announced Sophos Cloud, an easy to use security service that provides essential protection for today’s advanced threats. This first version of Sophos Cloud …

Microsoft details risks of running unsupported software

Microsoft published their Security Intelligence Report (SIR) volume 15, which analyzes threat intelligence from more than 1 billion systems worldwide to provide in-depth …

Women crucial for taking infosec industry to next level

Women represent only 11 percent of the information security workforce yet they have the academic background and diverse perspective necessary to accelerate change in the …

When the phone call is more dangerous than malware

During Social Engineer Capture the Flag contest, one of the most prominent and popular annual events at DEF CON 21, a pool of 10 men and 10 women, from diverse backgrounds and …

Secure corporate BYOD solution by ForeScout

ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …

RSA takes a big data approach to help with high-risk threats

RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …

Control system security: safety first

Every large utility, pipeline, refinery and chemical plant has a cyber security program, but most are IT-centric. Anti-virus programs, software update programs and programs of …

US legislators introduce bill to end dragnet phone data collection

US Senate Judiciary Committee Chairman Patrick Leahy and Congressman Jim Sensenbrenner, chairman of the Crime and Terrorism Subcommittee in the House, introduced on Tuesday a …

93% of firms increasing cyber-security investments

93% of companies globally are maintaining or increasing their investment in cyber-security to combat the ever increasing threat from cyber-attacks, according to a new survey …

Centralizing threat intelligence to feed network defense systems

ThreatConnect announced the launch of a prototype that connects commercial security products with advanced threat intelligence through an open source standard known as the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools