CoverMe: Private texting, sharing and secure phone calls app
CoverMe, a secure texting, document sharing and phone call app, launched today after a beta period. Features include: Make free secure phone calls Send self-destructing …
Week in review: NSA taps Google and Yahoo, breaking game console security, phone calls more dangerous than malware
Here’s an overview of some of last week’s most interesting news and articles: ISO 27001 standard benefits, implementation tips and security controls Dejan Kosutic …
Tips for protecting your personal and business data
As the risk of security breaches continues to become more prevalent, it is increasingly important that consumers and organizations protect their confidential information. …
US Senate committee backs law to continue phone-record collection
A few days after a bill seeking to end the government’s dragnet collection of phone records has been introduced by US Senator Patrick Leahy and Congressman Jim …
Security misconceptions among small businesses
More than 1,000 SMBs participated in a joint McAfee and Office Depot survey last month, and the majority (66 percent) felt confident that their data and devices are secure and …
Lavabit and Silent Circle to create email impervious to snooping
The founders of recently shut down encrypted email service Lavabit and encrypted communications firm Silent Circle have announced the creation of the Dark Mail Alliance, a …
Retail sector slow in adopting new PCI standards
Tripwire announced the results of research on risk-based security management in the retail industry, and the news isn’t good: the majority of the retail sector is yet to …
NSA taps cables connecting Google and Yahoo data centers
The US NSA and its UK counterpart GCHQ have collaborated in tapping the overseas fiber-optic cables used by Google and Yahoo to exchange data stored in their many data centers …
Network IDS reduces “white noise” for more focus on critical vulns
RandomStorm has announced the latest release of its next generation network intrusion detection system (NIDS), StormProbe. StormProbe analyses all network traffic, using more …
Spike in suspicious traffic and TOR usage, says threat report
Solutionary has released its Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report for Q3 2013, providing intelligence on key security threats …
Solving network security complexity with automation
Network security has become too complex to manually manage, and companies should consider automation and orchestration in order to increase IT agility while maintaining …
Exposing unknown threats with mathematical science
Cylance announced today the official worldwide release of CylanceV, a new cloud and on-premise solution to find what others miss in detecting advanced malware. CylanceV …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades