Please turn on your JavaScript for this page to function normally.
Turning mobile devices into enterprise credentials

Entrust is extending its Entrust IdentityGuard strong authentication platform to offer smart credentials on mobile devices for enterprise-grade security. Taking advantage of …

Non-profit org aims to solve Internet’s security issues

Just thirty years from its initial appearance on the world’s computing stage, the Internet is now so embedded in business and society that life without it is almost …

A walk through the expo at RSA Conference 2012, part two

The expo floor at this year’s RSA Conference is bigger than ever, with numerous companies exhibiting for the first time. Here’s another look at the show floor, …

Employees are deliberately disabling security controls

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …

EMC unveils five new security advisory services

Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, …

Cloud-based security with embedded wireless access

Cybera announced the Cybera ONE Platform now delivers its full suite of cloud-based security services, as well as remote backup and recovery, over high-speed wireless 3G and …

RSA Conference 2012 award winners

RSA Conference announced the honorees of its 15th annual awards program. Award applicants were judged in the fields of mathematics, public policy and security practices. Also …

New “HTTPS Everywhere” for Firefox and a beta for Chrome

The Electronic Frontier Foundation (EFF) launched the 2.0 version of HTTPS Everywhere for the Firefox browser today, including an important new update that warns users about …

Surveying policies, controls and compliance

Qualys unveiled a new service for its QualysGuard Cloud Platform and suite of integrated applications for security and compliance to help businesses further automate their …

Software app kits for accelerating security apps

Netronome announced a major upgrade to its Network Flow Management (NFM) software framework including new application kits for next-generation firewalls (NGFW), IPsec, …

Most executives don’t pay attention to cyber risks

The advanced findings from the latest 2012 Carnegie Mellon CyLab Governance survey of how corporate boards and executives are managing cyber risks reveals the issue is still …

Cloud-based targeted attack prevention

M86 Security announced its strategy to deploy its core malware and threat research capabilities for Web and email into the cloud, beginning with the launch of the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools