Please turn on your JavaScript for this page to function normally.
Half of enterprise networks will be obsolete within five years

Technology trends such as BYOD, video and virtualization are rapidly consuming network capacity and capabilities, and 45 percent of the enterprise networks assessed during …

RIPS: Free PHP security scanner

RIPS finds vulnerabilities in PHP applications using static code analysis. By tokenizing and parsing all source code files RIPS is able to transform PHP source code into a …

Security appliance market continues to grow

According to IDC, both factory revenue and unit shipments grew in the first quarter of 2012 marking the eighth consecutive quarter of year-over-year growth. Worldwide factory …

Samsung samples first 16GB DDR4 modules

Samsung has begun sampling the industry’s first 16GB DDR4, registered dual inline memory modules (RDIMMs), designed for use in enterprise server systems. Using …

Mastering Windows Network Forensics and Investigation

Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book …

Firewall management, IPv6 and you

Created 30 years ago, IPv4 has a 32-bit addressing scheme and can support approximately 4.3 billion devices connected directly to the Internet. Well aware that IPv4 addresses …

ISACA issues COBIT 5 for Information Security

ISACA released COBIT 5 for Information Security, which builds on the COBIT 5 framework to provide practical guidance for those interested in security at all levels of an …

Microsoft SQL Server 2012 T-SQL Fundamentals

Get started with the fundamentals of Transact-SQL and learn how to write efficient and powerful database queries. With this hands-on guide, you’ll gain a solid …

Week in review: Investigating Android permissions, a new malware detection method, and a drastic decline in online vulnerabilities

Here’s an overview of some of last week’s most interesting news, interviews, videos and articles: App retrieving contactless credit card details pulled from Google …

The fluctuation of compliance

After this weekend, all retailers accepting payment card transactions will be expected to either use a specialized firewall for protecting their Web applications or to have …

12% of Fortune 500 infected with DNSChanger malware

IID announced that 12 percent of all Fortune 500 companies and four percent of “major” U.S. federal agencies are still infected with DNSChanger malware. These …

Radical reduction in online vulnerabilities

WhiteHat Security reviewed serious vulnerabilities in websites during 2011, examining the severity and duration of the most critical vulnerabilities from 7,000 websites across …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools