Please turn on your JavaScript for this page to function normally.
Employees deliberately ignore security rules

A recent survey from Lieberman Software reveals that more than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by …

Attacking SCADA wireless systems

Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …

Mobile device data recoveries surge

Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …

Fortinet to acquire Coyote Point

Fortinet has entered into a definitive merger agreement to acquire Coyote Point Systems, a privately-held provider of application delivery, load balancing and acceleration …

Week in review: Becoming a malware analyst, South Korean cyberattacks, Apple implements two-step verification for iCloud accounts

Here’s an overview of some of last week’s most interesting news, videos, podcasts, reviews and articles: Becoming a malware analyst If you’re considering a …

BYOD and data protection top concerns with cloud adoption

According to a new AccelOps survey, 65 percent of organizations are using cloud services, while only 46 percent have moved mission-critical applications and data outside the …

Piracy and IP theft trouble software publishers

A joint survey by SafeNet and SIIA of more than 620 software developers and 194 enterprise software end users, revealed that developers continue to struggle with how to secure …

GFI WebMonitor 2013 brings web filtering to off-network laptops

GFI Software announced GFI WebMonitor 2013, the latest version of the company’s Web security and filtering solution targeted at SMBs. This new version enables IT …

Citrix brings big data analytics to the datacenter

Citrix announced NetScaler Insight Center, a new solution based on the company’s cloud networking platform that delivers deep visibility and control to critical business …

Strategies of a world-class computer security incident response team

Today’s Computer Security Incident Response Team (CSIRT) should have everything they need to mount a competent defense of the ever-changing IT enterprise: a vast array …

Enterprise mobility cloud report reveals iOS domination

Citrix released its Enterprise mobility cloud report, revealing key trends that are shaping the enterprise mobility market. The report is based on aggregate data from Citrix …

Scan, monitor and analyze SSL-encrypted communications

SSL Locksmith exposes the contents of SSL-encrypted network communications, which eliminates a critical cyber security blind spot. Many network and security applications are …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools