Please turn on your JavaScript for this page to function normally.
The multiple dimensions of corporate espionage

You’ve spent months fixing the red items on an internal audit report and just passed a regulatory exam. You’ve performed a network vulnerability assessment and …

AuthenTec acquires PeerSec Networks

AuthenTec has acquired PeerSec Networks, a provider of networking security solutions. The PeerSec Networks team and complete product portfolio, which includes the Matrix …

Twitter acquires Moxie Marlinspike’s startup

Well-known security researcher and speaker Moxie Marlinspike’s startup Whisper Systems has been acquired by Twitter. The official announcement says: The Whisper Systems …

40% of orgs doubt effectiveness of disposal procedures of old PCs

UK organizations aren’t certain that all data and settings are deleted from devices prior to disposal, say the findings of a recent survey by user and infrastructure …

AT&T notifies users of failed “organized” attack

A failed attempt at accessing and stealing AT&T customer information has been made public as some of its users received an official email from the company notifying them …

Most popular prohibited IT activities in the workplace

In spite of the fact that 74% of the interviewed IT professionals have already misused the company’s IT system, and could have lost their job, if a video recording could …

Worldwide security service spending to reach $35.1 billion

Worldwide security services spending is on pace to reach $35.1 billion in 2011, up from $31.1 billion in 2010, according to Gartner. The market is forecast to total $38.3 …

Motorola attempted to crush competitor via “Chinese spy ring” allegations

Four years ago a software engineer that worked for Motorola was arrested by U.S. Customs agents as she was trying to board a plane heading for China. Hanjuan Jin was carrying …

Most firms don’t coordinate security planning

Despite the potentially crippling impact of security events on corporate performance, many executives report that their security function is not well coordinated with …

Check Point extends 3D security with Dynasec acquisition

Check Point announced the acquisition of privately held Dynasec, a provider of Governance, Risk Management and Compliance (GRC) solutions. The acquisition extends Check Point …

GFI Software reaches into the cloud with Monitis acquisition

GFI Software has acquired Monitis, a provider of cloud-based network and systems monitoring solutions. This acquisition further strengthens GFI’s ability to provide …

Nasdaq attackers spied on companies

The systems of the company that operates the Nasdaq Stock Market were breached many times last year, but the actual trading platform was never compromised. A subsequent …

Don't miss

Cybersecurity news