Big Votes in the House on Cyber Security Legislation
When the House Republican Cybersecurity Task Force released its recommendations last October, U.S. Representative Mac Thornberry (R-TX), the Chairman of the Task Force said that the time had come for...
View ArticleGCHQ Releases World War II Turing Documents
Outstanding news, via the BBC's Chris Vallance, of the public release [by GCHQ] of two papers authored by Alan Turing, Ph.D., Entitled 'The Applications of Probability to Crypt' and 'The Paper on...
View ArticleCORE Security Announces CORE Insight Enterprise 2.0
With version 2.0, CORE Insight now offers a comprehensive set of vulnerability management capabilities
View ArticleSureCloud Launches Unified Compliance Platform
SaaS solution helps midmarket organizations automate and simplify security and compliance processes
View ArticleSplunk Live! 2012 in Washington, DC
Why do over 3,700 companies, including more than half of the Fortune 100, use Splunk to gain new levels of visibility and insight from their machine data? It's because Splunk is the fastest, easiest...
View ArticleBocada Announces Physical And Virtual Data Protection Management In Single...
Bocada vpConnect correlates data protection activities across environments
View ArticleArbor Announces New Version Of Peakflow SP
New features within the platform include ATLAS Intelligence Feed
View ArticleLANDesk Acquires Data Analytics Company
Managed Planet marks LANDesk's fifth acquisition
View ArticleWebsense Reports Record First Quarter Billings On Strong TRITON Performance
First quarter revenues of $89.5 million, up 1 percent year-over-year
View ArticleNetDNA And GlobalSign Bring Instant Provisioning To Web Security With...
EdgeSSL is a one-stop SSL Certificate solution for the NetDNA content delivery network
View ArticleDirty Disks Raise New Questions About Cloud Security
Context Information Security IDs potentially significant flaws in the implementation of cloud infrastructure services
View ArticleNew Vormetric Release Uses Chips To Make Enterprise Encryption Invisible
Vormetric Encryption V5 includes scalability enhancements
View ArticleCloud Fundamentals Video Series: Interdependencies Among Cloud Services and...
By: Tim Rains, Director, Trustworthy Computing Consumers of cloud services generally don’t get to see the layers of technology that they rely on. For many, this seamless delivery is part of the value...
View ArticleFrom the Trenches: Worst IT Mistakes, Part 2
By Chuck Romano This week, I continue on the worst IT mistakes I’ve seen in my 10+ years as a repair tech, building on last week’s tip about always being cognizant of the vulnerabilities of SSL VPNs....
View ArticlePaulDotCom Security Weekly Episode 284 – Martin Bos, Derbycon, Backtrack,...
Tune in to PaulDotCom Security Weekly TV, Hack Naked TV, and Hack Naked At Night episodes on our YouTube Channel or our Bliptv channel. Martin Bos Interview: Password Auditing with Nessus &...
View ArticleVMware Security Note: ESX Source Posted
The VMware Security Response Center has posted the following announcement Yesterday, April 23, 2012, our security team became aware of the public posting of a single file from the VMware ESX source...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleThe walls aren’t tumbling down, they are just moving
We can blame networking. IT security was never simple, even when computers were largely stand-alone machines connected to banks of green-screened terminals. However interfaces between systems were...
View Article