LATEST NEWS

Orgs predict $53M risk, on average, from crypto key, digital cert attacks

In a Ponemon report, 2,300 security pros provided their two-year outlook on cryptographic key and digital certificate attacks.

Vulnerability found in popular hotel routers

A flaw in InnGate routers could allow an a attacker to distribute malware to guests, monitor and record data sent over the network and possibly gain access to the hotel's reservation and keycard systems.

Federal Reserve Bank of New York creates cybersecurity team

Sarah Dahlgren, the New York Fed's head of supervision, announced that the bank had created a team dedicated to cybersecurity.

Silk Road drug dealer sentenced to five years in prison

Steven Sadler sold close to a million dollars' worth of cocaine, heroin and methamphetamine over the underground marketplace the Silk Road.

FEATURED: Mobile Security

Protecting work info ranks low in mobile privacy survey

In the Lookout survey, only five percent of smartphone users said they would take the most steps to protect work-related data.

Product Reviews

Rapid7 Nexpose Ultimate Appliance

starstarstarstarstar
Rapid7 Nexpose Ultimate is a comprehensive vulnerability scanner that is determined to convince you of its findings.

SAINT Security Suite

starstarstarstarstar
The SAINT Security Suite is a robust software package that quickly and easily gives a heads-up view of vulnerabilities on the network.

Tripwire IP360

starstarstarstar½
The Tripwire IP360 appliance is a solution for advanced enterprise threat detection, vulnerability management and risk assessment.

OPINIONS

Why it's time to replace the tootsie pop approach to network security

Why it's time to replace the tootsie pop approach to network security

How did we arrive at this approach to network security and, more importantly, what's happening today that's causing us to seriously rethink this approach?

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US