Please turn on your JavaScript for this page to function normally.
Deploy endpoint encryption technologies with Wave Cloud 2014

Wave Systems launched Wave Cloud 2014, a cloud-based service for enterprise-wide management of endpoint encryption. It includes management of Windows BitLocker and Mac …

CORE Impact Pro 2013 R2 gets enhanced web services capabilities

CORE Security released CORE Impact Pro 2013 R2, that allows organizations to proactively test IT infrastructure and identify exactly where and how an organization’s …

Data broker databases breached, stolen info used by ID theft service

Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be …

Yahoo ID recycling scheme is potential security minefield

Yahoo’s recently announced email account / Yahoo ID recycling scheme was meant to free up inactive (and attractive) accounts so that they can be snapped up by another …

Employees keep using personal cloud services to store work documents

Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows in which 5% of …

Java exploits jump, Android malware emerges outside app stores

A continued rise in exploit-based attacks, particularly against Java, and an increasing sophistication in mobile threats characterized the first half of 2013, which saw its …

Free Wi-Fi, but at what cost?

An investigation into public Wi-Fi has found that 51% of free Wi-Fi hotspots in the UK allow access to content of an adult nature. AdaptiveMobile examined Wi-Fi filtering …

Budget and job trend data for CISOs

Wisegate released its IT Security Benchmark Report, based on a survey developed by Wisegate Members, who are senior CISOs and security practitioners, to answer the questions …

Phishing and malicious attachments on the increase

Spam volume has dropped in August, but with the level of phishing increasing tenfold and malicious attachments being found in 3.4 percent more emails when compared with July, …

MEPs raise suspension of EU-US bank data deal

MEPs raised the possibility of suspending or even terminating the EU-US Terrorist Finance Tracking Programme (TFTP), during the discussion on Tuesday about the NSA’s …

Attackers sharpen skills: What that really means for CISOs

Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their …

Survey highlights ignorant IT behavior in the workplace

You receive a strange email. It looks shady. You’re probably being phished – a hacker is attempting to gain access to your enterprise. They must want to hijack …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools