Is network monitoring dead?
Network monitoring is dead, says the CEO of cPacket Networks; that is, unless network monitoring solutions become agile enough to deliver real-time visibility, while keeping …
EiQ Networks launches SOCVue service
EiQ Networks announced SOCVue, a new remote management service. With this development organizations can now leverage EiQ’s SOC team expertise and knowledge to protect …
A primer on Bitcoin risks and threats
Bitcoin is a digital currency whose creation and transfer is based on an open source cryptographic protocol. There are many benefits to using it (no transaction fees, …
Fake AV scammers impersonate Microsoft
Cyber scammers continue to impersonate Microsoft and try to trick users into believing that their computer is serious need of an AV solution. Webroot researchers have spotted …
Serious website vulnerabilities continue to decrease
A new WhiteHat Security report has correlated vulnerability data from tens of thousands of websites from more than 650 organizations, with software development lifecycle …
FinFisher spy kit’s C&C servers are popping up around the world
Some two months ago, Reporters Without Borders have identified UK-based Gamma International as one of the “enemies of the Internet” due to their FinFisher spyware …
Which companies help protect your data from the government?
The Electronic Frontier Foundation has released its annual report on online service providers’ practices when it comes to protecting users’ privacy and data from …
The insecurity of the component lifecycle
Open source component use continues to skyrocket with applications now more than 80 percent component-based, while at the same time organizations continue to struggle with …
IT security risks of features in connected cars
In an effort to provide new conveniences as well as meet physical security standards, many new consumer vehicles are offering more complex features. Click the image to view …
New mobile security practice from Trustwave
Trustwave unveiled a new mobile security practice designed to help businesses embrace mobility and BYOD programs while maintaining compliance, managing security risks and …
1010data updates big data analytics platform
1010data released a new version of its cloud-based Big Data analytics platform, which improves the ability of business analysts to quickly glean insights from the largest …
How do you protect yourself in the event of a data breach?
Identity Guard warns consumers to be aware of the increased risk of identity theft and provides tips on how they can help protect themselves from becoming a victim. In a …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount