Please turn on your JavaScript for this page to function normally.
CipherCloud delivers searchable strong encryption

CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables …

Real-time operational risk and compliance monitoring

Corvil announced a real-time general purpose risk and compliance monitoring solution for all kinds of electronic trading businesses. The solution monitors and captures all …

Video: DIY Command & Control for fun and no profit

Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside …

Best practices for threat management

With threats of all types on the rise and increasing costs of security breaches growing (analyst approximate $840,000 per breach), enterprises are investing in numerous threat …

Internet sites “fingerprint” users by secretly collecting browser info

A group of European researchers have released the results of their research into just how many of the most visited Internet websites track users without their knowledge with …

Week in review: Dangerous vBulletin exploit in the wild, Blackhole exploit kit creator arrested

Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: How to establish trust in the cloud In order to enforce corporate …

Infographic: The nightmare of securing unstructured data

This infographic from SealPath comes with data and facts of data loss in enterprises: sources of data breaches, market trends, technologies related to data protection, etc. …

Tamper-resistant jailbreak detection from Arxan

Arxan announced new tamper-proof jailbreak detection security and environmental sensing technology. In addition to Arxan’s pre-existing Guards, which are running on over …

Yara rules for leaked KINS toolkit

Just a few days ago, the source code of the famous KINS banking Trojan was leaked. KINS aims to infect as much computers as possible in order to steal credit cards, bank …

Video: Stop making excuses, it’s time to own your high impact vulnerabilities

Most systems are insecure, not because we don’t know about or understand the vulnerability but because we fail at planning and communicating the solution to address or …

New approach for real-time security incident response

NetCitadel announced a new analytics-driven, context aware approach for protecting enterprise networks from increasingly sophisticated security attacks and APTs. The evolution …

GFI Software launches cloud-based web protection service

GFI Software announced the addition of its Web Protection service to GFI Cloud, which enables SMB IT managers to reduce exposure from Web-based security risks and productivity …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools