Deploy endpoint encryption technologies with Wave Cloud 2014
Wave Systems launched Wave Cloud 2014, a cloud-based service for enterprise-wide management of endpoint encryption. It includes management of Windows BitLocker and Mac …
CORE Impact Pro 2013 R2 gets enhanced web services capabilities
CORE Security released CORE Impact Pro 2013 R2, that allows organizations to proactively test IT infrastructure and identify exactly where and how an organization’s …
Data broker databases breached, stolen info used by ID theft service
Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be …
Yahoo ID recycling scheme is potential security minefield
Yahoo’s recently announced email account / Yahoo ID recycling scheme was meant to free up inactive (and attractive) accounts so that they can be snapped up by another …
Employees keep using personal cloud services to store work documents
Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows in which 5% of …
Java exploits jump, Android malware emerges outside app stores
A continued rise in exploit-based attacks, particularly against Java, and an increasing sophistication in mobile threats characterized the first half of 2013, which saw its …
Free Wi-Fi, but at what cost?
An investigation into public Wi-Fi has found that 51% of free Wi-Fi hotspots in the UK allow access to content of an adult nature. AdaptiveMobile examined Wi-Fi filtering …
Budget and job trend data for CISOs
Wisegate released its IT Security Benchmark Report, based on a survey developed by Wisegate Members, who are senior CISOs and security practitioners, to answer the questions …
Phishing and malicious attachments on the increase
Spam volume has dropped in August, but with the level of phishing increasing tenfold and malicious attachments being found in 3.4 percent more emails when compared with July, …
MEPs raise suspension of EU-US bank data deal
MEPs raised the possibility of suspending or even terminating the EU-US Terrorist Finance Tracking Programme (TFTP), during the discussion on Tuesday about the NSA’s …
Attackers sharpen skills: What that really means for CISOs
Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their …
Survey highlights ignorant IT behavior in the workplace
You receive a strange email. It looks shady. You’re probably being phished – a hacker is attempting to gain access to your enterprise. They must want to hijack …
Featured news
Resources
Don't miss
- Why work-life balance in cybersecurity must start with executive support
- Reconmap: Open-source vulnerability assessment, pentesting management platform
- Microsoft will start removing legacy drivers from Windows Update
- CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets
- Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777)