Please turn on your JavaScript for this page to function normally.
Silent updating for Internet Explorer

Microsoft announced that in 2012 Internet Explorer will be updated “silently” to its newest possible version. This new silent update will eliminate the pop-up …

The rise of social media abuse and mobile malware

IID released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, …

Challenges facing critical infrastructure operators

While critical infrastructure operators hold great responsibility for managing security, compliance and operations, many struggle to balance the resources required for each of …

Security behavior and buying trends for 2012

PCI data security standards may be a hot topic, but a recent survey by Gartner found that 18 percent of respondents admitted to not being PCI-compliant, even though the survey …

Users go to extreme measures for Internet access

Seven out of 10 young employees frequently ignore IT policies, and one in four is a victim of identity theft before the age of 30, according to a global study from Cisco. The …

Security-hardened key management

Thales announced keyAuthority 3.0, combining high availability and hardened security to deliver a field-proven high assurance key manager. keyAuthority enables organizations …

Syncplicity launches Security and Compliance Console

With Syncplicity, users get their own secure Virtual Private Cloud where they use the applications, files and folders they are used to. With the File changes, no matter where …

Mobile pickpocketing and botnets will rise

Mobile threats are on the rise — Lookout estimates that mobile threats successfully stole more than one million dollars from Android users in 2011. In 2012, Lookout predicts …

Top 5 authentication predictions for 2012

Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …

Cloud computing certification

With the use of cloud computing expanding and the demand for IT workers with cloud skills growing, CompTIA introduced a new specialty certification focused on cloud computing …

Virtualization can transform data protection

According to a Vanson Bourne survey of 500 CIOs virtualization has the potential to transform data protection. In order to achieve this, greater strides need to be made in …

Mobile VPN client for Android

Columbitech released a mobile VPN client for Android 4.0, available for free download from Android Market. The security level of the Columbitech MVPN is designed for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools