Please turn on your JavaScript for this page to function normally.
Employees are deliberately disabling security controls

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …

EMC unveils five new security advisory services

Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, …

ManTech acquires HBGary

ManTech International, a provider of technologies and solutions for the US intelligence and defense community and various other federal government agencies, has announced that …

Surveying policies, controls and compliance

Qualys unveiled a new service for its QualysGuard Cloud Platform and suite of integrated applications for security and compliance to help businesses further automate their …

Most executives don’t pay attention to cyber risks

The advanced findings from the latest 2012 Carnegie Mellon CyLab Governance survey of how corporate boards and executives are managing cyber risks reveals the issue is still …

Shaping the future of information security

Once again, the Innovation Sandbox proved to be one of the most interesting events at RSA Conference 2012, as ten creative companies got a moment in the spotlight to present …

Automated managing of enterprise assets

Qualys announced the availability of hierarchical Dynamic Asset Tagging for its QualysGuard Cloud Platform and suite of applications for security and compliance. The …

A platform to stop APTs and malware

Bit9 announced the Bit9 Advanced Threat Protection Platform that protects all enterprise endpoints, servers and private clouds from cyber-attacks that bypass older antivirus …

Detection and securing of built-in passwords

Lieberman Software announced that the company’s privileged identity management product, Enterprise Random Password Manager (ERPM), now offers a solution to identify …

RSA enhances its threat intelligence delivery platform

RSA announced that RSA NetWitness Live service now provides 30 percent more threat content, customized content distribution capabilities and new integration with RSA’s …

Transformable security engine from Stonesoft

Stonesoft introduced the Stonesoft Security Engine, a transformable security engine that is capable of delivering seven enterprise-class product configuration modes to provide …

Log management deserves a company’s respect

Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it’s the law. Still, few …

Don't miss

Cybersecurity news