Please turn on your JavaScript for this page to function normally.
IRISS Conference 2010 call for papers

IRISS will hold its first annual conference on the 18th of November 2010. This all day conference will focus on providing you with an overview of the current cyber threats …

Early life cycle security assessment service

HP announced Comprehensive Applications Threat Analysis, a new security service to help companies reduce vulnerabilities at the onset of the application development life cycle …

Beware when placing online bets during the World Cup

With the World Cup approaching, online players all over the world are preparing to place their bets on the different soccer games. Taking security issues into account and …

iPhone security showcase: SafeWallet – Password Manager

Mobile software producer SBSH this week released a new version of SafeWallet – Password Manager, an application used for storing private information on your iPhone and …

Rogue software details: Protection Center

Protection Center is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Cyberattacks still top security priority

USIS released a study that identified key issues facing government and industry security personnel and identified a key issue in terms of security vendor structure and …

34 vulnerabilities fixed in June Patch Tuesday

In today’s Patch Tuesday, Microsoft delivers 10 security bulletins that address 34 vulnerabilities affecting Windows, Office and Internet Explorer. Vulnerabilities in …

IBM launches new security solutions

Today at the IBM Innovate 2010 conference in Orlando, IBM introduced new software and services that help organizations build security into the initial design of their …

Source code testing tool AppScan Source Edition released

Building on the momentum of its recent acquisition of security vendor Ounce Labs, IBM introduced AppScan Source Edition, a new addition to its Web application security and …

Uncovering the business benefits behind the new ICO powers

The latest amendment to the Data Protection Act, which came into effect on the 6th of April, means that the Information Commissioner’s Office (ICO) is now able to impose …

IBM delivers secure enterprise mail for the iPad

IBM announced an expansion of IBM Lotus messaging and collaboration software with the delivery of secure enterprise mail for the Apple iPad. IBM Lotus Notes Traveler is no …

1 in 10 IT pros cheat on an IT audit

According to a survey conducted by Tufin Technologies, of 242 IT professionals mainly from organizations employing 1000 to 5000+ employees, 1 in 10 admitted that either they …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools