LogRhythm launches automation suite for PCI
LogRhythm announced its Automation Suite for PCI. The suite helps organizations maintain continuous compliance and lower the costs of meeting PCI regulatory compliance …
Voting on Facebook privacy policy changes is open
As of Monday 12 p.m. PST, Facebook has opened the seven day period of voting for or against the proposed Data Use Policy and Statement of Rights and Responsibilities changes …
Hackers publish more info from UN atomic energy agency’s servers
Displeased with the International Atomic Energy Agency’s statement that they breached only an “old server,” anti-Israel hacker group “Parastoo” …
Tumblr worm proliferated due to XSS flaw
Yesterday’s worm rampage that left many a Tumblr site “defaced” with a message by Internet troll group GNAA was the result of improper input sanitation. …
Wireless LAN platform for mobile application delivery
Aruba Networks announced a new wireless LAN platform that addresses the explosion of mobile applications and devices challenging enterprise networks, while dramatically …
Mass phishing emails a thing of the past?
PhishMe predicts that phishers will be changing their tactics in 2013 – resorting to targeted spear phishing emails rather than the mass mails of the past. Spear …
Risk study identifies top pain points in 2013
The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices …
Three major impacts when moving to a BYOD policy
Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …
Guidance Software unveils fast forensic bridge
Guidance Software announced the Tableau T35u USB 3.0 forensic SATA/IDE bridge for forensic imaging in both lab and field environments. The T35u supports write-blocked, …
Sendmail and Mimecast partner on hybrid-cloud email security
Sendmail and Mimecast announced a new partnership that provides additional enhanced options for integrating and configuring email management solutions, which are needed to …
Three out of every four malware infections are caused by Trojans
PandaLabs analyzed the IT security events and incidents from July through September 2012. The third quarter of the year has seen an increase in the number of hacking attacks …
Handy malicious domain registering service available to cybercriminals
Despite its illegal nature, the industry revolving around cybercrime follows the same rules characteristic for any human economic enterprise: those who discover a need, create …
Featured news
Resources
Don't miss
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)