Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest News

On October 21, 2002, the Internet’s core root server system as a whole came under a significant attack. A coordinated distributed denial-of-service attack aimed to knock the 13 domain name system root servers – the closest thing the Internet has to a single point of failure – offline. Had it succeeded, electronic communications would have eventually frozen up and e-commerce would have slowly ground to a halt. The economic consequences could have been dire.

From interacting on social network sites, to disabling company installed security software so they can access restricted Web sites, most employees were more focused on individual concerns and conveniences than their company's overall IT security, according to the 2010 Trend Micro survey on corporate and small business end users.

On demand IT security risk and compliance solutions provider, Qualys, and RSA, The Security Division of EMC (NYSE: EMC), have expanded their technology partnership to make QualysGuard vulnerability management and IT policy compliance data available to RSA’s client base.

Top 10 Malware Threats for AprilSunbelt Software has announced the top 10 most prevalent malware threats for the month of April 2010. With nine of ten detections from March still on the list for April, it shows continued prevalence of Trojan horse programs circulating on the Internet. A new loader for a rogue security product making it into the top 10.

IT security and data protection firm Sophos announced that it has reached an agreement to sell a majority interest in the company to private equity group Apax Partners. The transaction will value the company at $830 million. Following the transaction, the founders of Sophos will retain a significant minority shareholding.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.

Cloud Security

CISO Strategy

Microsoft security chief Charlie Bell pledges significant reforms and a strategic shift to prioritize security above all other product features.