Security implications of the rise of silicon-based life forms
Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …
Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …
The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …
In this video recorded at Infosecurity 2012, Wolfgang Kandek, CTO at Qualys, talks about their recent research dealing with Java. Many modern exploits use Java as a stepping …
Last week we announced SSL Pulse, a continuously updated dashboard that is designed to show the state of the SSL ecosystem at a glance. While it is possible today to deploy …
Bloxx announced the release of the Bloxx Secure Web Gateway (SWG), an appliance that combines the company’s dynamic real-time content analysis and classification engine, …
Guardian Analytics announced FraudMAP Mobile, the company’s latest fraud prevention innovation, purpose-built to identify suspicious mobile banking activity. The …
Credant Technologies announced Credant Enterprise Edition 7.3, which includes improved features and functionality to help organizations meet their growing needs for protecting …
84 percent of web applications from public companies were deemed unacceptable when measured against the OWASP Top 10 most frequently exploited web application vulnerabilities, …
Just two months from its inauguration date at the RSA Conference in San Francisco on February 29, the Trustworthy Internet Movement (TIM) announced today that it has chosen …
BeyondTrust announced PowerBroker DLP v4.0, its data loss prevention solution with real-time, distributed artificial intelligence, which provides organizations a …
Help Net Security is attending Infosecurity Europe 2012 in London this week. Here’s a peek at the situation on the expo floor.
Only 20% of IT executives say they have visibility into files and data moving inside and leaving their organization, and 29% of them perceive moving data back and forth …