APSolute Immunity provides networks with ability to fight emerging threats
Radware introduced its APSolute Immunity security initiative, a new strategic approach that maintains business continuity by protecting the applications infrastructure against …
More malicious attacks on the Threat Horizon
The Information Security Forum (ISF) is warning of an increase in malicious threats including attacks from organised crime and industrial espionage, along with a rise in …
Malware growth at a higher level than ever before
In its 2008 first half data security summary, F-Secure reports malware growth rate at a higher level than ever before. This recent explosion of malware doesn’t …
New book: “Your Brain: The Missing Manual”
Your Brain: The Missing Manual is a practical look at how to get the most out of your brain — not just how the brain works, but how you can use it more effectively. What …
Multiple vulnerabilities in Ruby
Multiple vulnerabilities in Ruby may lead to a denial of service (DoS) condition or allow execution of arbitrary code. With the following vulnerabilities, an attacker can lead …
Research pinpoints how institutions should respond to data breaches
Javelin Strategy & Research announced today results from a new study covering data breach victims, which highlights the acute awareness among consumers about data …
Lack of visibility and control puts enterprise network resources at risk
Nearly 50% of enterprises believe employees and non-employees have access to data that is not relevant to their job function according to a recent survey the company …
New mobile antivirus and firewall solutions
Sybase iAnywhere today announced that it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities. Sybase Information Anywhere …
The demand for RFID and biometric security solutions
Government and security agencies worldwide increasingly demand high-tech solutions to secure their borders. In response, the security industry is developing technology that …
Shocking data privacy abuse by UK businesses
UK businesses are giving out highly personal and confidential details about their customers to third parties in a bid to boost sales reveals a new survey by StrongMail of 900 …
Threat of an embedded security disaster
For many years, embedded systems have been quietly working behind the scenes of almost all modern technologies, from automobiles to factory floors to space exploration …
Scandal of snooping IT staff
Whilst you sit there innocently working away, little do you realize that a third of your IT colleagues have been snooping around the network, looking at highly confidential …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE