Please turn on your JavaScript for this page to function normally.
New book: Network Flow Analysis

Network flow analysis is the art of studying high volume network traffic. Rather than capture every single packet, flow analysis allows network administrators to selectively …

WhiteHat Sentinel: SaaS website vulnerability management

WhiteHat Security updated WhiteHat Sentinel, its software-as-a-service (SaaS) website vulnerability management offering, including new User and Role Management options, …

Firefox 3.6.4 fixes several security issues

Mozilla released Firefox 3.6.4 that fixes several security issues as well as stability issues. User tracking across sites using Math.random() Security researcher Amit Klein …

Secure social media management

Cyveillance announced the availability of Secure Social Media Management, which provides organizations with professional review and consultation of social media policies and …

Basic TCP/IP analysis

Hansang Bae leads the Network/Application Performance Engineering Team with direct responsibility for Packet Capture Infrastructure at Citi. In the video below he discusses …

Teens share alarming amounts of personal info online

McAfee released “The Secret Life of Teens,” a survey that surveyed 955 U.S. 13-17 year olds (including 593 teens ages 13-15 and 362 teens aged 16-17) and reveals …

The ultimate Black Hat 2010 party by Qualys

The Qualys party at Black Hat featuring integration partners will take place at the Jet Mirage Nightclub on Wednesday, July 28, 8PM – 2AM. Dance the night away to …

Online family protection for iPhone, iPod touch and iPad

McAfee announced Family Protection iPhone, iPod touch and iPad Edition which provides strong parental controls to keep children safe when they are browsing the Internet on an …

Patch management from the cloud

In today’s IT world, devices are mobile and the Internet has become the corporate network. The result is additional challenges for IT Managers to keep devices patched …

Trustwave acquires Breach Security

Trustwave, a provider of information security and compliance solutions, has acquired Breach Security, a provider of web application firewall technology. The terms of the deal …

Rugged Tablet PC with hard drive encryption

Motion Computing announced the J3500 Tablet PC which features Intel Core vPro processors for enhanced performance, security and manageability. The J3500 also offers a variety …

Half of IT professionals leave mobile security to chance

As threats to corporate data grow, and the cost of breaches increase, a survey of alleged security conscious professionals has remarkably revealed that over half of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools