Most IT admins considering quitting due to stress
The number of IT professionals considering leaving their job due to workplace stress has jumped from 69% last year to 73%, underlining the increasingly challenging business …
Infosec Twitter wisdom: March 27, 2013
Here’s food for thought from people you should be following on Twitter. People don’t get why Inception was such a profoundly great movie. It’s a story where …
UK sets up cyber attack information exchange center
In an effort to help its private and public sector companies combat the cyber attacks and cyber espionage efforts directed their way, the UK government has launched a new …
Malware analysis: Collaboration, automation and training
Whether you’re a novice or a professional at analyzing malicious code, you’ll have a desire to learn or pass on that skill. Most malicious code analysis is …
Federal agencies willing, but not ready, for Big Data
More than 75 percent of federal managers believe Big Data has the power to fundamentally transform federal operations, according to the Government Business Council (GBC) and …
Cisco redesigns CCNA routing and switching certification
Cisco today announced a redesign of the Cisco associate-level certification programs and the evolution of the CCNA certification to CCNA Routing and Switching certification. …
Fraud detection solutions for online retailers
ID Analytics introduced a suite of fraud detection solutions that allows online retailers to use more than standard rules and their own transactional data to help drive …
Stuxnet attack was illegal under international law, experts say
The Tallinn Manual on the International Law Applicable to Cyber Warfare – the recently released tentative rulebook on what actions should and should not be considered or …
Grum botnet makes a comeback
Last year’s takedown of the Grum botnet was one the most fascinating ones so far, as it triggered a quick response from the botherders who tried to derail law …
Cloud-based tool simulates social engineering
TraceSecurity launched the TraceSecurity Phishing Simulator, a secure, cloud-based solution that allows organizations to safely perform on-demand social engineering tests that …
Activists now targeted with trojanized backdoor apps
Phishing emails targeting Tibetan and Uyghur activists and containing spying malware masquerading as legitimate DOC and PDF files are nothing new, as such spam campaigns have …
New IronKey secure USB flash and hard drives
Imation expanded the IronKey secure USB product line with new hardware encrypted flash and external hard disk drives. The IronKey D80 flash drives and H80 hard drives enable …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down