Please turn on your JavaScript for this page to function normally.
No skeleton key: Protecting your organization on the web

Weaknesses in the SSL protocol or the public certificate authority ecosystem that underpin it have received a lot of coverage recently and the last couple of weeks have been …

Password amnesia and online identity

The use of multiple passwords is posing a security risk to individuals and businesses alike, according to Ping Identity. A new study, which surveyed 2,000 consumers, …

NAC system PacketFence 3.2.0 released

PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. This is a major release with new features, new hardware support, …

Application security intelligence combats mobile threats

Cenzic introduced a new application security intelligence service that secures mobile applications on all mobile platforms, via the cloud. The new solution scans and provides …

Identity fraud hits 11.6 million in the US

In 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held …

New capabilities for the IBM security intelligence platform

IBM unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to …

Six principles for effective cloud computing

The growing shift to cloud computing can deliver significant value—but most enterprises have little knowledge of the perils of transferring IT decision making away from …

Juniper Networks acquires Mykonos Software

Juniper Networks has acquired Mykonos Software, a provider of Intrusion Deception Systems that protect websites and web applications. Under the terms of the agreement, Juniper …

Metasploit identifies IPv6 security risks

Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …

New backup appliances from Imation

Imation introduced new purpose-built backup appliances designed to enable SMBs to safeguard their information with multiple levels of data protection from a single backup …

Virtualized security routers for cloud security

Halon Security announced a next-generation firewall and security router as a virtual appliance named Virtual Security Router (VSR). VSR is a complete security package for …

Users don’t bother changing default passwords

Most people working with sensitive information want stricter security policies but rarely bother changing default, automatically generated and assigned passwords. To collect …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools