The FTC settled a case with Upromise after it failed to encrypt information and provide details about its data collection practices.
Anonymous strikes again, massive cyber fraud scheme busted, certificate authorities, and more.
Company news: Larry Whiteside named CISO at Spectrum Health Systems, and other M&A and personnel announcements.
While many mobile applications do what they're supposed to, countless others carry malware.
Companies are looking for network and server engineers.
When people ask him what he does, Rick JR Mayberry tells them he helps Fortune X companies develop their network security roadmap.
Debate: M&A activity in the cyber security arena will significantly increase in 2012.
As cloud computing evolves, security strategies must address load, perimeter and behind-the-firewall protection, as well as availability.
There are legitimate situations that require elevated privileges for users to accomplish their jobs.
An enhanced volume of sharing is allowing critical infrastructure operators and government agencies to better defend themselves from attacks, says Mark Clancy, The Depository Trust ...
Organizations are working overtime to design ways to control, via policy and technology, employees' penchant for sharing private information across social networking and mobile devices.
Turf wars remain a major roadblock to embracing the merger of physical and logical security. But Honolulu CIO Gordon Bruce believes the right time for ...
Criminals are finding social media websites like Facebook, which contain a vast array of personal assets, to be a treasure trove of information that they ...
Data protection laws can be more effective if simpler, says JAS Global Advisors' Jeff Schmidt.
If one wants to address a vulnerability, one needs to add vulnerability management.
Core Impact Professional started life as a pure-play penetration test tool.
The Retina CS from eEye Digital Security provides a multitude of vulnerability scanning and management features and functions.
The FortiScan-3000C from Fortinet provides full agent-based and agent-less vulnerability scanning, as well as patch management capabilities and remediation.
LanGuard 2011 from GFI is a powerful vulnerability management application.
Lumension Scan is a part of the larger Lumension Vulnerability Management platform.
The McAfee Vulnerability Manager comes loaded to the gills with powerful onboard tools for solid vulnerability management.
The Nexpose Enterprise Edition appliance from Rapid7 is another tool that has grown into a vastly different product over the years.
Last year at about this time, we were introduced to Saintbox from Saint and found it a wonderful marriage of all the Saint products in ...
Unlike traditional hardware appliances, this product is available as both a rack mount server, but also as a smaller Dell OptiPlex unit.
The Corporate Software Inspector (CSI) from Secunia takes an interesting approach to vulnerability assessment.
Back again this year is our old friend Nessus from Tenable Network Security. For as long as most can remember, this has been a necessary ...
ManageEngine Security Manager Plus from Zoho is a full-scale tool that provides a lot of punch in a relatively tiny package.
This month's First Look specializes in whole disk encryption and, unlike many other products, can do the entire process of encryption and encrypted disk access ...