Please turn on your JavaScript for this page to function normally.
IBM acquires i2 to fight crime and security threats

IBM will acquire i2 to accelerate its business analytics initiatives and help clients address crime, fraud and security threats. Financial terms were not disclosed. With more …

Akamai insider pleads guilty to foreign economic espionage

A former Akamai employee has been accused of and has pleaded guilty to having passed on confidential information regarding the company to a man he believed was a Israeli …

VMware acquires PacketMotion

PacketMotion has been acquired by VMware. Terms of the acquisition were not disclosed. PacketMotion’s PacketSentry UAM solution has been extensively deployed in support …

Big corporations “hacked” in Defcon social engineering contest

Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …

The privacy officer’s agenda according to Gartner

Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …

Amazon extends cloud access, enables “identity federation” for accessing it

Amazon Web Services has extended Amazon Virtual Private Cloud (Amazon VPC) to all AWS Regions, allowing enterprises to launch their Amazon VPC environments in the US East and …

Free password reset self service solution for SMBs

Nervepoint Technologies announces the launch of Access Manager Self Service, a free Password Self Service solution for SMBs. With almost zero-configuration, the service …

Automated malware analysis for businesses

GFI released GFI SandBox 3.4 (formerly CWSandBox), the latest update to their malware analysis tool that helps security professionals assess suspected files and URLs for …

An epidemic of security worst practices

The majority of organizations fail to adhere to simple data protection standards and, in many cases, are fully unaware of what security practices are currently in place, …

Unprecedented state-sponsored global cyberattack revealed

The news that at least 72 government agencies, corporations and political organizations based all over the world have been targeted (and compromised) for over five years by …

Tracking anomalies from multiple sources across the organization

Zettaset unveiled its new Security Data Warehouse (SDW), which enables users to track up to petabytes of business and security data for anomalies and other potentially …

“Assume you are compromised,” say top security officers

RSA released a new report that takes an in-depth look at the seismic shift in the cyber threat landscape, as enterprises are increasingly targeted for corporate espionage and …

Don't miss

Cybersecurity news