Please turn on your JavaScript for this page to function normally.
Seagate unveils three new enterprise-class HDDs

Seagate announced three new enterprise-class hard disk drives optimized for traditional data centers and emerging cloud infrastructures. Perfect for cloud bulk data storage, …

Fortinet unveils FortiOS 5.0 operating system

Fortinet announced FortiOS 5.0, a security operating system that is the foundation for all Fortinet FortiGate integrated security platforms. This new release provides more …

Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …

Most people want control of information collected by data brokers

As Congress examines how data brokers collect, aggregate and share consumers’ personal information, a new survey by TrustedID shows that most people are confused about …

Multi-dimensional analytics tool for big data

LogRhythm announced the enhancement of its SIEM 2.0 Big Data security analytics platform with the industry’s first multi-dimensional behavioural analytics. Leveraging …

Bloxx launches VMware virtual appliance

Bloxx released virtual appliance versions of its Web Filter and Secure Web Gateway. The virtual appliances have identical functionality to the current hardware appliances, …

GFI Software unveils VIPRE SDK for Windows

GFI Software announced the availability of VIPRE 6.0 SDK (for Windows environments) adding several new security features that software developers, PC utility providers and …

Malware targeting Skype missed a trick

Last week reports came out stating that the Dorkbot worm is now targeting Skype users. The worm fools users into downloading the malware, whose payload locks down machines. …

Hack In The Box celebrates a decade of security conferences

Last week’s Hack In The Box Security Conference saw the return of over 40 of the most popular speakers from the last decade presenting in a triple track format over 2 …

How to get promoted in IT security

Not only has landing a job become more difficult; it’s also getting harder to get promoted once you have the job. Here are some tips to getting ahead in today’s …

Network complexity causes security incidents

Complex network security policies, such as those found in multi-vendor environments, are directly related to system outages and security breaches, according to AlgoSec. The …

Merchants ineffectively fighting online fraud

Although most merchants have made a concerted effort to fight e-commerce fraud, their methods are largely ineffective against fraudsters and off-putting to consumers, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools