This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

Global regulator says cyber-attack could hurt financial markets

Global regulator says cyber-attack could hurt financial markets

Global market watchdog International Organisation of Securities Commissions (Iosco) has warned that the next major financial shock - or 'black swan event' - could come from a cyber-attack.

MORE NEWS

New Trojan targets 'happy to help' customer service people

New Trojan targets 'happy to help' customer service people

UK and European companies in industries including automotive, finance, energy and telecoms are being attacked by new Trojan malware called 'Carbon Grabber' that steals online banking password and other credentials.

Sony hit by DDoS attackers who maybe trolls or Jihadists

Sony hit by DDoS attackers who maybe trolls or Jihadists

Microsoft and other online game providers also disrupted, while Sony president's plane is diverted by bomb hoax.

CISOs offered new way to secure Android devices

CISOs offered new way to secure Android devices

US and German researchers have come up with a novel way to secure the notoriously flaw-ridden Android - a framework that allows corporate and other users to rapidly add security enhancements to Android devices without having to touch the firmware or operating system itself.

PRODUCT REVIEWS

Safetica Technologies Safetica v5

starstarstarstarstar
Safetica manages and controls data security at the endpoint through its client-server architecture and three major components: Endpoint Client, Management Server and the Safetica Management Console.

Trend Micro Smart Protection Complete v11

starstarstarstarstar
Trend Micro Smart Protection Complete v11

Lumension Endpoint Management and Security Suite LEMSS v8.0

starstarstarstarstar
Unifies IT operations and security through a single console, server and agent architecture to address IT risk and systems management requirements across the enterprise.

Virtual Events

Opinions

How do you stop an Energetic Bear?

How do you stop an Energetic Bear?

Companies must think like a hacker and commit to penetration testing to protect themselves from data breaches, says Chema Alonso.

Is your app secure? Probably not

Is your app secure? Probably not

App vulnerabilities need to be thought about holistically, so the network and database in which they reside also need to be considered says Josh Shaul.

All your vulnerabilities belong to us: The rise of the exploit

All your vulnerabilities belong to us: The rise of the exploit

The growing impact of web exploits isn't just limited to the enterprise market and must be countered on an industry-scale, says Pedro Bustamante.

Director's Cut

Sign up to our newsletters