Please turn on your JavaScript for this page to function normally.
BYOD workers pose serious security risks

Fortinet conducted a global survey that reveals the extent of the challenge posed to corporate IT systems by first generation Bring Your Own Device (BYOD) users; people …

Bluebox, founded by Caleb Sima and Adam Ely, gets $9.5 million

Bluebox, a start-up developing enterprise security technology, has closed a $9.5 million Series A financing round led by Andreessen Horowitz. Additional investors include …

Control and measure web application scans

NT OBJECTives announced NTOEnterprise 2.0 which enables organizations to plan, manage, control and measure web application scans and also assess and prioritize areas of …

UK businesses worst in Europe at protecting information

Mid-sized businesses in the UK are Europe’s worst performers when it comes to managing information risk, according to research from Iron Mountain and PwC. The study …

Identify and block mobile malware on enterprise networks

Sourcefire announced new advancements for delivering visibility and control to help enterprises protect against threats that result from mobility and Bring Your Own Device …

Anti-theft system for PCs and Android devices

Bitdefender launched an anti-theft system for PCs and Android devices that turns the tables on thieves, giving you control over your phone, laptop or tablet even when …

The dangers of NOT passing cybersecurity legislation in 2012

According to the U.S. Government, cyber-security protection of critical infrastructure is a national priority. With 85 percent of the nation’s critical infrastructure …

Vulnerabilities in open source WAF ModSecurity

During our research of web application firewall evasion issues, we uncovered a flaw in ModSecurity that may lead to complete bypass of the installed rules, in the cases when …

Increase in cyber threats and sabotage on critical infrastructure

The Pacific Northwest National Laboratory (PNNL), in conjunction with McAfee, revealed a report that fully examines the current challenges facing critical infrastructure and …

Highest paying IT certifications

ISACA’s Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying …

Real life examples on hackers bypassing CAPTCHA

Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A …

Predicting Malicious Behavior

Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools