ISO 27001 video tutorials
One of the biggest obstacles for companies starting to implement ISO 27001 is writing various documents required by this information security standard. Information Security …
Confidential data at risk even with policies in place
Think confidential information is protected by company IT security policies? Think again. A new survey by Xerox and McAfee, reveals that more than half of employees say they …
Intel details next-generation communications platform
Intel disclosed several features for the company’s next-generation communications platform, codenamed Crystal Forest. The platform will handle data processing across the …
Protect data by finding forgotten databases
Application Security declared that organizations can no longer afford to guess or assume that they have their database inventory under control. Based on the premise that you …
Practical Malware Analysis
Malware. You know what it is. Perhaps you’ve even fought a malware infection or two. Wouldn’t it be nice if the good guys finally had one really complete guide to …
Web filtering technology with next-generation firewall capabilities
Barracuda Networks announced the integration of the Barracuda NG Firewall and Barracuda Web Security Flex. This solution combines cloud-based Web filtering technology with …
Mozilla wants CAs to stop issuing and revoke MITM certificates
A heated debate has unfolded after Trustwave made public their decision to revoke a subordinate root certificate it issued to a company that allowed it to intercept their …
Open source password manager gets two-factor authentication
Yubico announced a successful implementation of YubiKey two-factor authentication with the free, open source password manager software Password Safe. The joint solution offers …
Horde FTP server hacked, files modified to include backdoor
The developers of the Horde open source software have issued a statement warning its users that a one of their FTP servers was discovered to have been breached and some files …
February Patch Tuesday lighter than expected
It turns out that this February Patch Tuesday is lighter than we had anticipated. Some of the nine bulletins should be less worrisome to IT admins: the Office vulnerability …
Gap in patch priorities vs cybercriminal targets
Internet users are at risk from the rapid growth in software security flaws – specifically end-point vulnerabilities. Businesses should be doing far more to help …
“Free $200 Ebay Gift Card” leads to rogue Facebook app
A message sharing an “event” offering a “Free $200 Ebay Gift Card for first 10,000 Attendants!” has been popping up on Facebook users’ walls in …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance