China Boots Cisco Systems from Telecom Network, Cites Security Concerns

China Boots Cisco Systems from Telecom Network, Cites Security Concerns

China Unicom will take over the China169 network backbone

FBI Aims to Expand Its Ability to Quickly Identify Hackers and Their Motives

FBI Aims to Expand Its Ability to Quickly Identify Hackers and Their Motives

Terrorists conducting attacks via the Internet are a major concern

Softpedia Exclusive: Crossbeam Expert on Security Challenges Faced by Mobile Operators

Softpedia Exclusive: Crossbeam Expert on Security Challenges Faced by Mobile Operators

Securing a network is not easy when millions of new endpoints are about to be added

US and Canada Vow to Further Enhance Cybersecurity Cooperation

US and Canada Vow to Further Enhance Cybersecurity Cooperation

The DHS and Canada's Ministry of Public Safety announced the Cybersecurity Action Plan

Experts: iPad Mini Sales to Bring More Security Challenges for Mobile Network Operators

Experts: iPad Mini Sales to Bring More Security Challenges for Mobile Network Operators

Crossbeam Systems knows a lot about the impact of a surge in sales

Iranian Officials Call for New Cyber Defense Strategy

Iranian Officials Call for New Cyber Defense Strategy

It shouldn't rely on the same technology as the one used by the enemy

Researchers Highlight the Pros and Cons of Windows 8 Security Systems

Researchers Highlight the Pros and Cons of Windows 8 Security Systems

Windows Defender, UEFI and ELAM analyzed by Trend Micro experts

US Defense Secretary: Only Few Can Build Tool Like the One Used in the Aramco Attack

US Defense Secretary: Only Few Can Build Tool Like the One Used in the Aramco Attack

Here’s what US Defense Secretary Leon Panetta said in a press conference

Security Experts: We Hope Windows 8 Is Immune to Old Exploitation Techniques

Security Experts: We Hope Windows 8 Is Immune to Old Exploitation Techniques

FireEye researchers say protocol standards must be strictly enforced

Firms Warned About the Impact of Class Actions on the Cost of Data Breaches

Firms Warned About the Impact of Class Actions on the Cost of Data Breaches

Legal experts stress that courts are starting to allow more lawsuits to continue

Faulty SSL Certificate Validation Exposes Apps to MitM Attacks, Researchers Find

Faulty SSL Certificate Validation Exposes Apps to MitM Attacks, Researchers Find

Amazon libraries, PayPal's merchant SDK, and various shopping carts are affected

AlienVault Launches “Open Minds Exchange” Resource Center and iOS Mobile Apps

AlienVault Launches “Open Minds Exchange” Resource Center and iOS Mobile Apps

Useful research, tools and insight at your fingertips

RSA, AMD, Intel, Lockheed Martin and Honeywell Team Up for Cyber Security Alliance

RSA, AMD, Intel, Lockheed Martin and Honeywell Team Up for Cyber Security Alliance

The big players hope they can get the private sector and the government to work together

Imperva Experts Reveal the Best Practices and Tactics to Mitigate Insider Threats

Imperva Experts Reveal the Best Practices and Tactics to Mitigate Insider Threats

The secret to a secure organization revolves around four key elements

List of 2012’s Worst 25 Passwords Published, “Jesus” and “Ninja” Included

List of 2012’s Worst 25 Passwords Published, “Jesus” and “Ninja” Included

SplashData has released its annual report on password frequency

Siemens Passes Strict Industry Benchmarks for Cyber Security

Siemens Passes Strict Industry Benchmarks for Cyber Security

The company has obtained the Achilles Practices Certification from Wurldtech

United Nation Issues Warning: The Internet Is Used for Terrorist Purposes

United Nation Issues Warning: The Internet Is Used for Terrorist Purposes

The UN is trying to teach Member States how to use the Web to their own advantage

 
Want more? Browse: