The current state of application security
New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing …
Compliance and security vulnerabilities are top concerns for POS systems
Without adequate controls to manage store systems and the increase in number and variety of devices – retailers can expect security costs to continue to increase …
Layer 7 updates mobile access gateway solution
Layer 7 Technologies announced updates to its SecureSpan Mobile Access Gateway, a middleware solution that simplifies enterprise application management. Among its new …
SSLI SDK for security solution providers
With an increasing level of Web traffic rapidly moving to the encrypted HTTPS protocol, Bloxx is now offering its Secure Sockets Layer Intercept (SSLI) Software Development …
G-20 themed emails deliver spying malware to EU, Canadian officials
The topic of the G-20 summit that is scheduled to be held in Russia next month is being misused by multiple cyber espionage groups some of which have been tracked to China, …
Open source encrypted email service reaches crowdfounding goal
Mailpile, the open-source web-mail client with user-friendly encryption whose developers have been asking for funding on Indiegogo, has surpassed its $100,000 goal three weeks …
How did Snowden steal the NSA documents and cover his tracks?
Many things have been unveiled by the documents leaked by NSA whistleblower Edward Snowden, but the question of how he managed to extract them from the agency’s internal …
Poorly redacted court filing reveals Google contested NSL gag order
A court filing that has been improperly redacted and has recently been made public by the US Department of Justice shows that Google asked a US court to remove the gag order …
Cloud emulation sandboxing service tackles zero-day attacks
Check Point has announced the availability of Check Point R77, the latest release for its Software Blade Architecture. R77 offers over 50 product enhancements, including the …
Social networks: Can robots violate user privacy?
High-Tech Bridge decided to conduct a simple technical experiment to verify how the 50 largest social networks, web services and free emails systems respect – or indeed …
AirWatch and Appthority partner for mobile app risk analysis
Appthority and AirWatch announced that AirWatch EMM is integrated with Appthority’s fully automated App Risk Management service for app analysis and risk management. The …
McAfee protects workloads on private and public clouds
McAfee announced a new version of its data center security solution that addresses enterprises’ growing need to leverage the scalability and cost savings of running …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance