Please turn on your JavaScript for this page to function normally.
Effective MySQL Backup and Recovery

Effective MySQL: Backup and Recovery offers a no-nonsense approach to one of the most critical tasks of an operational DBA—performing, testing, and verifying backup and …

Kaspersky Lab publishes research about Wiper

In April 2012 a series of incidents were publicly reported about a destructive malware program, codenamed Wiper, which was attacking computer systems related to a number of …

Cybercriminals use throw-away domains to infiltrate enterprise networks

The first six months of 2012 saw continued increases of malicious infection activity and an intensified danger of email-based attacks as cybercriminals increasingly employed …

Secunia launches Corporate Software Inspector 6.0

Secunia announced the Secunia Corporate Software Inspector (CSI) 6.0 which provides customers with the ability to understand and evaluate their entire threat landscape, …

AirMapper App for Android measures Wi-Fi coverage and performance

Fluke Networks announced the AirMapper App, the first application for Android that provides a visual heat map of actual Wi-Fi throughput performance on smartphone and tablet …

UK data breaches up 1000% in five years

Imation today released figures obtained through a request under the Freedom of Information Act which show that data breach numbers in the UK have increased by more than 1000% …

Cloud Security Alliance Forms Big Data Working Group

The Cloud Security Alliance (CSA) and Fujitsu Laboratories of America announced launch of the Big Data Working Group which will take industry ownership in addressing the need …

vOPS Server Standard 6 extends control into cloud deployments

VKernel announced vOPS Server Standard 6.0. This release extends control into cloud environments and virtual machine (VM) performance with unified multi-data source VM issue …

Key challenges in proactive threat management

There is a downward trend in IT’s ability to consistently coordinate, measure and improve security data management processes, including log management, compliance …

Sensitive data protection with A+ Folder Locker

Giant Matrix released A+ Folder Locker, its new product for sensitive data protection. Thanks to advanced encryption algorithms and multi-level security, it guarantees that …

Cloud adoption generates security issues

Globally, the cloud continues to pose challenges on how to deliver agile, yet secure, IT services to enterprises. The percentage of companies that reported a data security …

Identifying and mitigating risk in virtual environments

Accuvant announced its FIDELITYv framework for identifying and mitigating risk in virtual environments which helps organizations realize more secure and agile IT models with …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools