LATEST NEWS

Citigroup report reveals poor disclosure track record at law firms

The New York Times obtained a copy of the internal Citigroup report, published by the bank's cyberintelligence unit.

Gov't offers $3 million reward for info on alleged Carder.su cybercriminals

The U.S. Department of State is offering up to $3 million for information leading to the arrest of two men who are allegedly tied to the Carder.su cybercrime syndicate.

Router attack results in ads and porn being injected into websites

As part of an ad-fraud scheme, attackers are using router malware to make it so advertisements and pornography are injected into every website that uses Google Analytics.

PhishMe, Inc. secures $13 million in Series B funding

PhishMe, Inc., a Leesburg, Va.-based phishing threat management solution provider, closed a $13 million investment in Series B funding led by Paladin Capital Group and new investor Aldrich Capital Partners.

FEATURED: Cyber Threats

Orgs predict $53M risk, on average, from crypto key, digital cert attacks

In a Ponemon report, 2,300 security pros provided their two-year outlook on cryptographic key and digital certificate attacks.

Product Reviews

Rapid7 Nexpose Ultimate Appliance

starstarstarstarstar
Rapid7 Nexpose Ultimate is a comprehensive vulnerability scanner that is determined to convince you of its findings.

SAINT Security Suite

starstarstarstarstar
The SAINT Security Suite is a robust software package that quickly and easily gives a heads-up view of vulnerabilities on the network.

Tripwire IP360

starstarstarstar½
The Tripwire IP360 appliance is a solution for advanced enterprise threat detection, vulnerability management and risk assessment.

Qualys Express Lite

starstarstarstarstar
Qualys Express Lite is a cloud-based vulnerability assessment tool intended for small businesses.

OPINIONS

The car alarm syndrome and the high cost of too many security alerts

The car alarm syndrome and the high cost of too many security alerts

Sophisticated bad guys are likely to assume that high-value targets have deployed the latest security technologies - this has been the case going back over a decade.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US