Please turn on your JavaScript for this page to function normally.
Threat detection for remote users by OPSWAT

OPSWAT announced the official release of GEARS, a cloud-based network security management platform that offers advanced threat detection for remote users by identifying …

Free tool helps fend off most cyber attacks

Today at the RSA Conference Qualys announced that it has collaborated with the SANS Institute and the Council on CyberSecurity to release a new free tool to help organizations …

Nearly half of companies assume they have been compromised

A majority of organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS …

Microsoft EMET’s protections can be bypassed, researchers show

Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is a good piece of software and helpful for protecting non-kernel Microsoft applications and third-party …

What’s the greatest security risk?

While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …

SAP Trojan based partially on Carberp code

Bit by bit, details about the first information-stealing Trojan discovered targeting SAP enterprise software are being unveiled, and Microsoft researchers have tied at least …

Deploy endpoint encryption technologies with Wave Cloud 2014

Wave Systems launched Wave Cloud 2014, a cloud-based service for enterprise-wide management of endpoint encryption. It includes management of Windows BitLocker and Mac …

DeviceLock now prevents data leakage from Macs

DeviceLock announced DeviceLock Endpoint DLP Suite 7.3 that delivers essential device control capabilities for corporate endpoints with OS X Lion and OS X Mountain Lion …

Free endpoint security inspection tool

Promisec announced a free, downloadable and automated security inspection for up to 100 endpoints. The free inspection process (available here) produces results in about five …

Security complexity and internal breaches are key concerns

Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses. 64% of respondents to a Check …

The rise of sophisticated malware

A recent Enterprise Strategy Group (ESG) research study focused on advanced malware protection and detection. The study revealed that enterprise organizations are seeing an …

Multiple Java versions on endpoints risky for enterprises

Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …

Don't miss

Cybersecurity news