LATEST NEWS

IBM launches free collaborative threat-sharing platform

IBM launched a cyber threat intelligence sharing platform on Thursday that the company is billing as a social media network for security analysts.

Cybersecurity bills move forward on Capitol Hill

A flurry of legislative activity on Capitol Hill hints that Congress may be shaking off its inertia and there may be some long-awaited forward movement on key issues.

Flash EK leveraged in potentially widespread malvertising attack

Researchers with Malwarebytes have identified a malvertising attack carried out through Merchenta, an advertising network that claims to reach more than 28 billion consumers per month in the U.S.

Study: Average organization has 4,000 instances of exposed credentials stored in the cloud

CloudLock released its "Cloud Cybersecurity Report: The Extended Perimeter" earlier this week that looked at enterprises' use of cloud applications and storage.

FEATURED: Cyberespionage

Cyber attacks to rise, but competent security talent scarce, study says

A whopping 82 percent of security and IT pros surveyed in an ISACA and RSA Conference study believe cyberattacks will rise in 2015 and 35 percent say they can't find qualified talent to fill security positions.

Product Reviews

Cyphercor LoginTC

starstarstarstar½
LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

Entrust IdentityGuard

starstarstarstar½
Entrust IdentityGuard is a dual-factor authentication server, app, smart card manager, biometrics server and general jack-of-all-trades when it comes to dual-factor authentication.

PistolStar PortalGuard

starstarstarstarstar
PortalGuard is a multifactor authentication, web-based single sign-on (SSO) through internet information services (IIS) and self-service password reset server and application rolled into one.

OPINIONS

Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US