Please turn on your JavaScript for this page to function normally.
Blue Coat delivers visibility and control for networks

Blue Coat Systems introduced new updates for Blue Coat PacketShaper appliances that enable businesses to embrace Web, cloud and mixed-use recreational applications on the …

5 cloud myths that will be debunked in 2013

There are a lot of common misconceptions and myths related to cloud computing. Many think of the cloud as less secure and reliable than on premise solutions, when in reality …

Motivations, trends and measurement of IT security spending

A new comparative survey by The Ponemon Institute explores the motivations behind IT security spending among UK and US organizations, and how industry regulations, data breach …

IT security implications of key technology trends for 2013

Automated controls are increasingly being used by organizations to manage the cost of compliance and reduce their business risk believes Turnkey Consulting. Their latest …

Most security pros want more desktop privilege control

While the majority of security professionals recognize the importance of limiting administrative rights on corporate desktops and laptops, many organizations continue to lag …

Researchers uncover Tor-powered Skynet botnet

Rapid7 researchers have recently unearthed an unusual piece of malware that turned out to be crucial to the formation of an elusive botnet – dubbed Skynet by the …

Key trends in financial crime, risk and compliance for 2013

Investment in managing financial crime and compliance remains a high priority, with a significant uptick in planned expenditure for 2013, according to Detica NetReveal. Fraud …

Facebook helps Feds take down international cybercrime ring

The Department of Justice and the FBI announced the arrests of 10 individuals from Bosnia and Herzegovina, Croatia, Macedonia, New Zealand, Peru, the United Kingdom, and the …

Increasing cloud adoption puts enterprises at risk

Enterprises are running one-third of their mission-critical applications in the cloud today and expect to have half of all critical applications running in the cloud by 2015, …

Not all security devices are created equal

Independent test lab Broadband-Testing released a report on its performance validation of IT network firewall solutions from Cisco Systems, NetPilot, SonicWall and WatchGuard. …

Cyberwarfare and the developing digital arms race

According to security expert Mikko Hypp?¶nen, we might not be in a cyber war but we are in a cyber arms race, and the governments involved are the James Bond of the …

Six threats to watch out for in 2013

FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year. 1. APTs Target Individuals through mobile platforms APTs also known …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools