Please turn on your JavaScript for this page to function normally.
LogRhythm launches automation suite for PCI

LogRhythm announced its Automation Suite for PCI. The suite helps organizations maintain continuous compliance and lower the costs of meeting PCI regulatory compliance …

Tumblr worm proliferated due to XSS flaw

Yesterday’s worm rampage that left many a Tumblr site “defaced” with a message by Internet troll group GNAA was the result of improper input sanitation. …

Wireless LAN platform for mobile application delivery

Aruba Networks announced a new wireless LAN platform that addresses the explosion of mobile applications and devices challenging enterprise networks, while dramatically …

Mass phishing emails a thing of the past?

PhishMe predicts that phishers will be changing their tactics in 2013 – resorting to targeted spear phishing emails rather than the mass mails of the past. Spear …

Risk study identifies top pain points in 2013

The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices …

Three major impacts when moving to a BYOD policy

Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …

Guidance Software unveils fast forensic bridge

Guidance Software announced the Tableau T35u USB 3.0 forensic SATA/IDE bridge for forensic imaging in both lab and field environments. The T35u supports write-blocked, …

Sendmail and Mimecast partner on hybrid-cloud email security

Sendmail and Mimecast announced a new partnership that provides additional enhanced options for integrating and configuring email management solutions, which are needed to …

Three out of every four malware infections are caused by Trojans

PandaLabs analyzed the IT security events and incidents from July through September 2012. The third quarter of the year has seen an increase in the number of hacking attacks …

Facebook and Google+ are prime targets for easy attacks

The law created to protect children’s online privacy actually increases risk, according to new research from Polytechnic Institute of New York University (NYU-Poly). The …

Employees use file sharing services despite bans

Large numbers of employees use Dropbox and other consumer file sharing services for sensitive work-related data, even if they know that their employer has a specific policy …

Would you dump your network provider after a security breach?

Compromised security – rather than high monthly fees – would be the biggest catalyst for triggering UK smartphone users to change mobile network providers. The …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools