Please turn on your JavaScript for this page to function normally.
The motives behind nation state driven cyber attacks

FireEye released a report that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide. “Cyber weapons are …

UK to create new cyber defence force

Defence secretary Philip Hammond has announced that the UK is to create a new cyber unit and speak full cyber warfare competency including both offensive and defensive …

The impact of false positives on web application security scanners

Ferruh Mavituna is the CEO at Mavituna Security and the Product Architect of Netsparker. In this interview he discusses what impact false positives have on web application …

Average online bank account is accessed by 2.4 unique devices

Each month, The ThreatMetrix Global Trust Intelligence Network (The Network) screens more than 500 million site visitors, across more than 1,900 customers and 9,000 websites …

Guidelines to manage increased IT risk

From cyberattacks and malicious employee actions to hacks into corporate social media accounts, 2013 is turning out to be a watershed year for technology-related enterprise …

Set, manage and monitor privileged account security

CyberArk announced Master Policy, a new “policy engine’ that enables customers to set, manage and monitor privileged account security in a single interface. The …

Protect high-value transactions on iOS and Android

SecureKey introduced its enhanced cloud-based briidge.net Connect multi-factor authentication service. This latest version of briidge.net Connect incorporates the new …

Cyberoam launches next-generation firewall appliances

Cyberoam unveiled Next-Generation Firewalls (NGFW) in its NG Series appliances. Cyberoam NGFW come with Layer 8 Identity-based technology for actionable intelligence and …

Week in review: Data broker databases breached, Apple Touch ID hack, and possible solution to click fraud problem

Here’s an overview of some of last week’s most interesting news, reviews and articles: IE 0-day attack reports push ISC to raise official threat level FireEye …

Legislation aims to end bulk collection of phone records

In order to restore the constitutional liberties that have been eroded by invasive surveillance and end secret interpretations of the law that vastly exceed the intent of …

Challenges faced by top CSOs

(ISC)2 released new data that outlines the chief challenges faced by top enterprise security executives and illustrates the broad range of complex – and sometimes …

Cloud Security Alliance releases Cloud Controls Matrix 3.0

The Cloud Security Alliance (CSA) released the CSA Cloud Control Matrix (CCM) 3.0, the standard for assessing cloud centric information security risks. It expands its control …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools