This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

SCADA systems: Riddled with vulnerabilities?

SCADA systems: Riddled with vulnerabilities?

SCADA systems are essential to the smooth running of critical infrastructure but, as evidenced by the Stuxnet attack, they can be exploited through software and hardware vulnerabilities, and human error. But experts contest if they are really under threat.

MORE NEWS

NSA has 850 billion pieces of searchable metadata

NSA has 850 billion pieces of searchable metadata

The National Security Agency (NSA) is reported to have developed its own search engine to sift through the billions of phone calls, emails and other electronic communications it harvests and monitors from around the world.

PCI Security Standards Forum warns on Backoff malware

PCI Security Standards Forum warns on Backoff malware

Malware around since last year, but only now visible to anti-virus security software.

Hundreds of Norwegian energy companies hit by cyber-attacks

Hundreds of Norwegian energy companies hit by cyber-attacks

Approximately 300 oil and energy companies in Norway have been hit by one of the biggest cyber-attacks ever to have happened in the country, a government official is reported to have claimed.

PRODUCT REVIEWS

Safetica Technologies Safetica v5

starstarstarstarstar
Safetica manages and controls data security at the endpoint through its client-server architecture and three major components: Endpoint Client, Management Server and the Safetica Management Console.

Trend Micro Smart Protection Complete v11

starstarstarstarstar
Trend Micro Smart Protection Complete v11

Lumension Endpoint Management and Security Suite LEMSS v8.0

starstarstarstarstar
Unifies IT operations and security through a single console, server and agent architecture to address IT risk and systems management requirements across the enterprise.

Virtual Events

Opinions

How do you stop an Energetic Bear?

How do you stop an Energetic Bear?

Companies must think like a hacker and commit to penetration testing to protect themselves from data breaches, says Chema Alonso.

Is your app secure? Probably not

Is your app secure? Probably not

App vulnerabilities need to be thought about holistically, so the network and database in which they reside also need to be considered says Josh Shaul.

All your vulnerabilities belong to us: The rise of the exploit

All your vulnerabilities belong to us: The rise of the exploit

The growing impact of web exploits isn't just limited to the enterprise market and must be countered on an industry-scale, says Pedro Bustamante.

Director's Cut

Sign up to our newsletters