Please turn on your JavaScript for this page to function normally.
Automatic and non-disruptive data migration

Varonis Systems announced Varonis Data Transport Engine (DTE), the newest family member of its Data Governance Suite, which solves how to securely move and archive data, …

Largest malware rise in four years

McAfee found the biggest increase in malware samples detected in the last four years. McAfee Labs detected a 1.5 million increase in malware since Q1 2012 and identified new …

A Practical Guide to Fedora and Red Hat Enterprise Linux, 6th Edition

An increasing number of advanced users are drawn to open source solutions as an alternative to Microsoft Windows. The popular free Linux distribution Fedora and it's big …

76% of IT pros in the dark about unauthorized application downloads

While IT professionals recognize the dangers that unauthorized applications cause to their networks, most are letting these dangers go unnoticed, according to a survey by …

Static analysis tool for C and C++

GrammaTech announced CodeSonar 3.8, a static analysis tool for C and C++. Improvements in CodeSonar 3.8 include: Faster analysis that takes full advantage of multi-core …

Server network virtualization acceleration technology for VXLAN implementations

Broadcom announced its NetXtreme II server network virtualization (NV) acceleration technology for VXLAN implementations, improving server performance by more than 55 percent. …

Networkless working: The future of the public sector?

It is no secret that the UK Government is still running at a significant loss. It is therefore no surprise that organisations are having to cut costs, and for the public …

The top Internet dangers for kids

As the Internet plays an increasingly prominent role in children’s lives, parents are getting increasingly worried about the ease with which undesirable content can be …

Network Management: Principles and Practices, 2nd Edition

Network Management: Principles and Practices, 2nd Edition is thoroughly updated and expanded to address broadband network management and the latest trends in the network …

Week in review: Java 0-day finally patched, and fast and furious reverse engineering

Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Fast and furious reverse engineering Tomislav Pericin is one of …

Chimera: A declarative language for streaming network traffic analysis

Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …

Preparing for your first security breach

So you’ve finally accepted it’s just a matter of time before you experience your first major breach. Despite all the work you’ve put in to your monitoring …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools