Please turn on your JavaScript for this page to function normally.
From identity and access solutions to access governance

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …

Military-grade encryption for Android devices

AuthenTec introduced a new security offering that provides military-grade encryption to data stored on Android smartphones and tablets. MatrixDAR helps bring Android devices …

OkayFreedom: VPN solution for private surfing

Steganos Software announced OkayFreedom, a VPN service enabling Internet users to privately and securely surf all Web content, regardless of their location. Designed for …

Developing and Hosting Applications on the Cloud

In this book, key developers of the IBM SmartCloud Enterprise share indispensable insights for developing and operating cloud-based solutions on any cloud platform. Drawing on …

Week in review: Shamoon attacks, automated hacking, Assange granted asylum in Ecuador

Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos and articles: Scientists create algorithm for tracking down sources of …

Provisioning is not access governance

Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …

Fluke Networks adds remote analyzer capability to wireless LAN tools

Fluke Networks announced a new remote analysis capability for its portable WLAN tools, making them the first to enable both real-time troubleshooting and spectrum analysis of …

Programming Computer Vision with Python

If you want a basic understanding of computer vision’s underlying theory and algorithms, this hands-on introduction is the ideal place to start. You’ll learn …

Tips to keep kids safe online

Malware is just a step-away when children click on games, free shoes, Justin Bieber videos or gift cards offered on social networks. Hackers use social engineering techniques …

Sharp rise in malware targeting Android

The number of new malicious programs targeting the Android platform has almost tripled in the second quarter of the year, according to Kaspersky Lab. Over the three months in …

Top mobility challenges facing C-level executives

Mre than fifty percent of the companies surveyed are now planning Mobile Productivity projects to allow employees to access, sync and share documents using mobile devices, …

NSS Labs expose inadequate AV products

NSS Labs testing showed that 9 of 13 popular consumer anti-virus products tested failed to provide adequate protection against exploits targeting two recent critical Microsoft …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools