Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Palo Alto unveils enhanced security platform

    Posted January 17, 2014 - 3:06 pm

    Network security firm Palo Alto Networks has enhanced its security platform to increase advanced threat detection and prevention capabilities.
  • 10 cloud security startups to watch in 2014

    Posted January 17, 2014 - 2:35 pm

    The market for cloud security tools is expected to grow significantly in the coming year. Here are 10 cloud security startups that could help boost cloud adoption in 2014 and beyond.
  • White Paper

    Evaluating The Cost Of A DDoS Attack

    Posted January 17, 2014 - 1:45 pm

    DDoS attacks don't just cost your company the annoyance of downtime, but brand reputation, customer acquisition, and of course, sales all are affected. Read this white paper to learn more.
  • Obama proposes changes to NSA surveillance

    Posted January 17, 2014 - 1:42 pm

    U.S. President Barack Obama called for changes to U.S. National Security Agency surveillance, with new privacy advocates assigned to a surveillance court and a transition away from a controversial telephone records collection program in the U.S.
  • Android-powered Blackphone promises extreme mobile privacy

    Posted January 17, 2014 - 12:57 pm

    Face it: we're living in an age where we're being watched. It's an unfortunate circumstance of how technology has progressed throughout the decades, and even when we think we're taking the right steps by adjusting our privacy settings, another news story comes out that all that information is freely available, anyway.
  • Slideshow

    Quick look: Obama and the NSA morass

    Posted January 17, 2014 - 12:42 pm

    New rules will limit NSA data gathering, but is the NSA paying attention?
  • Microsoft extends malware protection to XP foot-draggers

    Posted January 17, 2014 - 12:29 pm

    Microsoft ends support for Windows XP in April, but it will keep updating anti-malware software for the operating system for more than a year afterwards.
  • Cisco: Thousands of web hosting centers now launchpads for attacks

    Posted January 17, 2014 - 12:23 pm

    Web hosting centers around the world are being compromised by cyber-criminals that use them to launch major attacks against business and government, says Cisco in its annual security report. This threat really gained full steam last year, the company says.
  • How to bring shadow IT under control

    Posted January 17, 2014 - 12:21 pm

    While many IT departments want to take charge of provisioning cloud services, it may make more sense to get your arms around compliance and governance first.
  • Security firm IDs malware used in Target attack

    Posted January 17, 2014 - 11:21 am

    A security company that worked with the U.S. Secret Service to investigate the data breach at Target identified the malware used in the attack as a sophisticated derivative of a previously known Trojan.
  • Smart device or smartypants device? [CARTOON]

    Posted January 17, 2014 - 7:30 am

    With Google’s purchase of smart device maker Nest, the days of trusting your thermostat and household devices are over
  • Neiman Marcus says SSNs, birth dates not taken in breach

    Posted January 16, 2014 - 10:24 pm

    Neiman Marcus apologized on Thursday for a data breach that compromised payment card numbers, saying Social Security numbers and birth dates appear to be safe.
  • Target credit card data was sent to server in Russia

    Posted January 16, 2014 - 9:49 pm

    The stolen credit card numbers of millions of Target shoppers took an international trip -- to Russia.
  • California court dismisses Google Glass traffic ticket

    Posted January 16, 2014 - 9:27 pm

    A court in Southern California has dismissed what was apparently the first-ever traffic citation issued for wearing Google Glass while driving.
  • US forces Silk Road to give up $28M in bitcoins

    Posted January 16, 2014 - 7:39 pm

    The founder of the Silk Road underground website has forfeited the site and thousands of bitcoins, worth around US$28 million at current rates, to the U.S. government.
  • Juniper announces Firefly Suite for virtual-machine security

    Posted January 16, 2014 - 5:01 pm

    Juniper today announced its Firefly Suite for virtual-machine security, a set of software-based products for VMware and KVM that contain the security and switching capabilities found in Juniper's SRX Series Services Gateway, as well as Junos Space Virtual Director.
  • White Paper

    Endpoint Buyers Guide

    Posted January 16, 2014 - 4:45 pm

    Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you determine your requirements and identify the vendor that best meets your needs.
  • White Paper

    Mobile Device Management Buyers Guide

    Posted January 16, 2014 - 4:45 pm

    Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices. In this guide, you'll learn what you need to consider to find a MDM solution that best fits your needs.
  • White Paper

    Network protection and UTM Buyers Guide

    Posted January 16, 2014 - 4:45 pm

    This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need.
  • Hackathon geared toward the 'liberation' of data from public PDF documents

    Posted January 16, 2014 - 4:44 pm

    Massive amounts of unstructured data are held in the form of PDF documents, but extracting key figures and words out of PDFs in a programmatic manner can be difficult and costly. This poses a challenge to public-interest groups, journalists and others who are interested in running large-scale analyses on PDF documents in order to uncover valuable insights.
  • Question

    How can I use my Google account's 2-factor authentication with Outlook?

    Posted January 16, 2014 - 4:34 pm

    I’ve been using Outlook with Gmail (though IMAP) for years, but now that I’ve enabled 2-factor authentication, I’m having trouble with it. Can I still use Outlook if I use two factor authentication?
  • still has major security problems, experts say

    Posted January 16, 2014 - 3:14 pm remains riddled with security vulnerabilities and is ripe for ID theft three and a half months after its launch, two cybersecurity experts told U.S. lawmakers Thursday.
  • Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System

    Posted January 16, 2014 - 8:39 am

    Cisco Systems has released software updates for its Cisco Secure Access Control System (ACS) in order to patch three vulnerabilities that could give remote attackers administrative access to the platform and allow them to execute OS-level commands without authorization.
  • New Fujitsu Labs tech can do batch searches of encrypted data

    Posted January 16, 2014 - 5:38 am

    If snooping by the U.S. National Security Agency isn't enough to make you worry about your privacy, Japan's Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted.
  • Security startup Impermium joining Google

    Posted January 16, 2014 - 2:43 am

    Security company Impermium has joined Google to help boost the Internet giant's already considerable expertise in countering spam and abuse.
Join us:






Join today!

See more content
Ask a Question