Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest News

AT&T acknowledged on Wednesday that a security hole in its Web site had exposed the email addresses of some iPad owners.A group of computer experts that calls itself “Goatse Security” claimed to have exploited the AT&T Web site using part of an HTTP request, triggering a script which would return the associated email address using an AJAX-style response within the Web application.

Boston based Nasuni, a company that helps customers secure data stored with cloud storage providers such as Amazon AWS and RackSpace Cloud, this morning shared some ways to address data security in cloud based storage environments.

Companies are often faced with tough decisions regarding policies on social networking use in the workplace. For many companies, social networking is becoming an essential component of business. From online marketing to supporting clients and interacting with prospective customers, social networking is a valuable tool for businesses small and large. To the contrary, social networking can be a distraction and time wasting activity for those who do not use it for business purposes.

With the excitement surrounding Apple’s iPhone 4 at its World Wide Developer Conference (WWDC) yesterday, Apple decided not talk about the latest version of its Web browser during the Keynote, instead making the announcement and releasing the product later in the day.

The need for organizations to design and adhere to strong security policies in order to maintain the integrity of their systems is well understood. As long as all you have to worry about is your own internal infrastructure, creating the right policies and sticking to them is a great way to help reduce risk on your network. But there are some circumstances where it is necessary to outsource a mission-critical piece of infrastructure to a third party.

Internet infrastructure services provider, Neustar, Inc. (NYSE: NSR) announced today that its registry team has completed deployment of DNSSEC in the .US zone and is ready to accept Delegation Signer (DS) records. The .BIZ zone will follow quickly, accepting records as early as July 15, 2010, making it the second gTLD to be fully DNSSEC-enabled.

Companies around the world are increasingly using social media for business marketing, support, and collaboration but also exposing themselves to risks such as non-compliance, data loss and legal issues.

Top 10 Malware Threats - May, 2010Security software company, Sunbelt Software, in its monthly malware threat report, today announced the top 10 most prevalent malware threats detected in May 2010.

Log management and security company, LogLogic, today released a preview of its upcoming log management virtual appliances. The LogLogic Log Management Virtual Appliance is a virtual log management solution, offering enterprise-grade log data collection, search and storage capabilities for companies seeking to improve business operations, enhance security and meet compliance requirements. The virtual appliances operate on VMWare’s ESX virtual servers as well as on devices running VMWare WorkStation, and VMWare Player.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Financial terms were not released but the price tag is expected to be hefty with Exabeam’s most recent valuation pegged at $2.5 billion.