Trends

Poll: U.S. Government Not Ready For Cyberattacks

The U.S. government is due for a "major" cyberattack within the next 12 months...

Older Windows Versions Left Out Of Code Cleanup

Microsoft Corp. is working to quickly retire old, security-weak code in its Windows...

The Feds’ Top Hacker Speaks

One man is known for attacking the computer networks at various government agencies...

New Klez.G Email Worm Targets Outlook, Express

By eSecurity Planet staffVirus watchers are issuing warnings about a new variant of...

Vulnerabilities Found in Popular Web Scripting Language

By eSecurityPlanet.com StaffA vulnerability in the PHP scripting language, which is commonly used...

New Internet Explorer Security Flaw Found

A group of Russian researchers from SECURITY.NNOV has uncovered a new flaw in...

Primer: Developing a site security policy

The first rule of network site security is easily stated: that which is...

CyberSource offers tips for protecting sensitive data

CyberSource Corp., a provider of risk management and real-time payment systems for businesses...

Latest articles

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

ESET Product Review

Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization's infrastructure.  Some antivirus solutions...

Kasada Product Review

Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating...

Crowdstrike Firewall Management Product Review

Crowdstrike's Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It's a module within the broader Falcon endpoint protection...