Please turn on your JavaScript for this page to function normally.
ENISA summarizes 120 threat reports, identifies top trends

The EU’s cyber security agency ENISA has published the first Cyber Threat Landscape analysis of 2012, summarizing over 120 threat reports. The report identifies and …

Intel and McAfee to deliver consumer-centric online security

Together with Intel, McAfee is redefining the consumer security experience with a focus on safeguarding consumer devices, securing personal data and protecting identities …

Seagate releases storage device with Smart TV app

Seagate announced the first storage device to feature a Smart TV app for access to files on the big screen. Seagate Central delivers automatic backup for the entire home, …

Vulnerability management in the cloud from Dell SecureWorks

Dell SecureWorks announces a new Vulnerability Management Service (VMS) and a new Web Application Scanning (WAS) Service for the Cloud. These add-on Cloud security solutions …

The importance of data normalization in IPS

To fully comprehend the importance of data normalization in an Intrusion Prevention System, it is first necessary to understand what data normalization is and what it does, …

Toshiba unveils SSD with cryptographic-erase and self-encryption

Toshiba announced new enterprise SAS solid state drives (SSD), mobile SATA hard disk drives (HDD), including self-encrypting drive (SED) models in both product categories, and …

SuperSpeed USB (USB 3.0) at 10 Gbps with new capabilities

The USB 3.0 Promoter Group announced development of a SuperSpeed USB (USB 3.0) enhancement that will add a much higher data rate, delivering up to twice the data through-put …

Lenovo and EMC to bring Network Attached Storage to SMBs

Lenovo and EMC have completed the formation of LenovoEMC Ltd, the joint venture with a wider strategic partnership in industry standard servers and networked storage …

Keycard: Unlock your Mac using an iOS device

Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …

Training Guide: Installing and Configuring Windows Server 2012

Designed to help enterprise administrators develop real-world, job-role-specific skills, this Training Guide focuses on deploying and managing core infrastructure services in …

Week in review: IE zero-day used in active attacks, fraudulent digital certificate for Google domains revoked

Here’s an overview of some of last week’s most interesting news, reviews and articles: Database hacking: The year that was Have you ever been to the Privacy Rights …

Microsoft to release seven advisories on Tuesday

The first Microsoft Patch Tuesday of 2013 includes 7 advisories (MS13-001 – MS13-007), two of which are listed as critical because they can be executed remotely. One of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools