Trends

Poll: U.S. Government Not Ready For Cyberattacks

The U.S. government is due for a "major" cyberattack within the next 12 months...

Older Windows Versions Left Out Of Code Cleanup

Microsoft Corp. is working to quickly retire old, security-weak code in its Windows...

The Feds’ Top Hacker Speaks

One man is known for attacking the computer networks at various government agencies...

New Klez.G Email Worm Targets Outlook, Express

By eSecurity Planet staffVirus watchers are issuing warnings about a new variant of...

Vulnerabilities Found in Popular Web Scripting Language

By eSecurityPlanet.com StaffA vulnerability in the PHP scripting language, which is commonly used...

New Internet Explorer Security Flaw Found

A group of Russian researchers from SECURITY.NNOV has uncovered a new flaw in...

Primer: Developing a site security policy

The first rule of network site security is easily stated: that which is...

CyberSource offers tips for protecting sensitive data

CyberSource Corp., a provider of risk management and real-time payment systems for businesses...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...