Please turn on your JavaScript for this page to function normally.
cloud hand
40% of cloud services are commissioned without the involvement of IT

Intel Security released its second annual cloud security report, “Building Trust in a Cloudy Sky,” at RSA Conference 2017. The report outlines the current state of cloud …

Cybereason RansomFree
RansomFree protection software gets key upgrades

Today, at RSA Conference 2017 in San Francisco, Cybereason launched the latest version of RansomFree, the free, anti-ransomware protection software, which works on PCs running …

users
Security skills gap? What security skills gap?

After the year we’ve had, it shouldn’t come as a surprise that cybersecurity skills are heavily in demand. Breaches, attacks and incidents have never been far from the …

fence
Five ways to prevent data leaks

The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …

User
Six critical customer support differentiators in cybersecurity

Regardless of size or sector, excellent customer support is a major differentiator within any organization. In the cybersecurity industry, however, tech support is more than a …

magnify
Inline SSL solution eliminates network blind spots

At RSA Conference 2017, Gigamon announced an expansion to its GigaSECURE SSL/TLS Decryption solution, with new inline capabilities, bringing enhanced visibility into encrypted …

illusive DMS
Advanced machine learning platform preemptively identifies attack pathways

At RSA Conference 2017, illusive networks announced the illusive Deception Management System (DMS), a machine learning platform that preemptively identifies attack pathways …

abstract, generic
Week in review: Fileless malware, HTTPS interception in the wild, simple Gmail spoofing

Here’s an overview of some of last week’s most interesting news, reviews and articles: Banks around the world hit with fileless malware Kaspersky Lab researchers …

Eyes
The anti social network

Let’s be honest. Our online world is judged on how others view us, or as the psychologist Caldini would put it social validation. Want to buy a product? Well how many people …

Microsoft
Will February’s Patch Tuesday fix a known zero-day?

Coming into Patch Tuesday we have a known zero day on the Microsoft side, and we’ve seen example code for an SMB exploit that could lead to DoS and BYOD of a system. US …

CERT
CERT updates insider threat guidebook

The CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University released the fifth edition of the Common Sense Guide to Mitigating Insider Threats. …

Vera for Mail
Vera for Mail protects the confidentiality of email messages and attachments

Vera for Mail is an enterprise-grade security solution that lets businesses secure, track, and revoke access to any email they send. Built on Vera’s data-centric security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools