Please turn on your JavaScript for this page to function normally.
NetScout simplifies network forensics

NetScout Systems announced nGenius Forensic Intelligence, a new analysis module for the nGenius Service Assurance Solution that enables network operations and information …

Secure, isolate and protect documents

Copiun announced TrustedShare, an enterprise-grade mobile collaboration solution that lets workers securely access and manage documents on mobile devices while delivering …

Oculis Labs proactively protects data on computer displays

Oculis Labs announced PrivateEye Enterprise 4.0, a solution that proactively protects data on computer displays. This solution is built specifically to protect enterprise and …

Security and Privacy for Microsoft Office 2010 Users

Take control and put the built-in security and privacy features in Microsoft Office to work. Whether downloading documents, publishing a presentation, or collaborating online …

Popular Android apps leak private information

AhnLab identified many popular Android apps are asking for excessive permissions to access to the user data. AhnLab analyzed 178 best rated android apps using AhnLab Mobile …

Mobile vulnerabilities increased by 93%

A new Symantec report shows that while the number of vulnerabilities decreased by 20 percent, the number of malicious attacks continued to skyrocket by 81 percent. In …

Mobile security and identity management in the cloud

Executive-level security officers at some of the largest global companies have identified four main concerns for 2012: mobile device security, identity management for cloud …

Entitlement administration and governance

In the identity and access management (IAM) market, we’ve got the terminology all wrong. With bad labels comes misdirected thinking, which ultimately contributes to …

What’s in your daily slice of spam?

Just as the original spam – the tinned meat of 50 years ago – prompted people to wonder just what it contained, so too does the spam of the internet age. …

Programming iOS 5, 2nd Edition

Get a solid grounding in the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition of Programming iOS …

Week in review: Hotmail 0-day bug, CISPA, and securing embedded devices

Here’s an overview of some of last week’s most interesting news, podcasts and articles: SpyEye botnet for sale at bottom price A drop in the price asked for the …

Mobile malware increasingly delivered via social networks

The growing use of mobile devices to connect with social networks is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools