Cybersecurity bills move forward on Capitol Hill

A flurry of legislative activity on Capitol Hill hints that Congress may be shaking off its inertia and there may be some long-awaited forward movement on key issues.

Flash EK leveraged in potentially widespread malvertising attack

Researchers with Malwarebytes have identified a malvertising attack carried out through Merchenta, an advertising network that claims to reach more than 28 billion consumers per month in the U.S.

Study: Average organization has 4,000 instances of exposed credentials stored in the cloud

CloudLock released its "Cloud Cybersecurity Report: The Extended Perimeter" earlier this week that looked at enterprises' use of cloud applications and storage.

Former IT manager faces seven charges in federal indictment

An Illinois IT manager was federally indicted for launching a cyber attack against his former employer.

FEATURED: Cyberespionage

Cyber attacks to rise, but competent security talent scarce, study says

A whopping 82 percent of security and IT pros surveyed in an ISACA and RSA Conference study believe cyberattacks will rise in 2015 and 35 percent say they can't find qualified talent to fill security positions.

Product Reviews

Cyphercor LoginTC

LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

Entrust IdentityGuard

Entrust IdentityGuard is a dual-factor authentication server, app, smart card manager, biometrics server and general jack-of-all-trades when it comes to dual-factor authentication.

PistolStar PortalGuard

PortalGuard is a multifactor authentication, web-based single sign-on (SSO) through internet information services (IIS) and self-service password reset server and application rolled into one.


Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Sign up to our newsletters